Cybersecurity

123456789101112131415
Across
  1. 3. Authentication – When you need two steps to log in, like a password and a code.
  2. 4. – Turning information into code so other people can’t read it.
  3. 8. – Software that secretly watches what you do.
  4. 12. Horse – Malware that looks safe but is actually dangerous.
  5. 13. – Locks your stuff and makes you pay money to get it back.
  6. 14. – Malware that spreads by itself without needing anything else.
  7. 15. Footprint – The trail of stuff you leave online.
Down
  1. 1. – Software that finds and deletes viruses.
  2. 2. – A secret word you use to log into accounts.
  3. 5. – When someone tricks you into giving your info through fake emails or texts.
  4. 6. Security – Keeping a network safe from hackers.
  5. 7. – Any kind of bad software that can harm your device.
  6. 9. – A system that helps block hackers from getting into your network.
  7. 10. Breach – When someone steals private information.
  8. 11. – A bad program that spreads through files and can mess up your computer.