Cybersecurity
Across
- 3. – Turning information into code so other people can’t read it.
- 6. – A secret word you use to log into accounts.
- 9. – A system that helps block hackers from getting into your network.
- 10. – Software that finds and deletes viruses.
- 12. – Locks your stuff and makes you pay money to get it back.
- 14. Footprint – The trail of stuff you leave online.
- 15. Horse – Malware that looks safe but is actually dangerous.
Down
- 1. – When someone tricks you into giving your info through fake emails or texts.
- 2. – Software that secretly watches what you do.
- 4. – Any kind of bad software that can harm your device.
- 5. Authentication – When you need two steps to log in, like a password and a code.
- 7. Security – Keeping a network safe from hackers.
- 8. – A bad program that spreads through files and can mess up your computer.
- 11. Breach – When someone steals private information.
- 13. – Malware that spreads by itself without needing anything else.