Cybersecurity

123456789101112131415
Across
  1. 3. Software that secretly collects information about you
  2. 6. A scam using fake emails to steal personal information
  3. 7. Installing the latest software fixes and security patches
  4. 9. A system that blocks unauthorized access to a network
  5. 10. Manipulating people into revealing confidential information
  6. 12. An added layer of security requiring a code or device confirmation
  7. 13. The process of verifying a user’s identity
  8. 14. A tool used to securely store and create strong passwords
  9. 15. The process of converting data into code to prevent access
Down
  1. 1. When unauthorized access to data occurs
  2. 2. A copy of important data stored separately for safety
  3. 4. A secret word or phrase used to access an account
  4. 5. A tool that hides your IP address and encrypts your internet traffic
  5. 8. Software that detects and removes malicious programs
  6. 11. Software designed to damage or disrupt systems