Cybersecurity 2023
Across
- 4. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- 5. A security process that uses an additional factor for verification is called "______-Factor Authentication"
- 6. An individual that is authorized to access a system
- 8. A _____ email falsely claims to be from a legitimate source, usually with a threat or request for information
- 12. Designed to detect and destroy computer viruses
- 13. Junk email
- 14. Your digital ______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- 16. The gaining of unauthorized access to data in a system or computer
- 17. Converting information and data into code to protect unauthorized access to sensitive data
- 19. Tech used to keep intruders out
- 20. Online harassment
- 22. A set of changes that fix or improve a software or application
Down
- 1. Cybersecurity awareness month
- 2. Weakness in a system
- 3. A sequence of words used for authentication
- 7. Storage for infected files and emails
- 9. The fraudulent practice of sending a text message impersonating the head of school in order to induce individuals to reveal personal information or purchase a gift card
- 10. Software demanding money to unlock personal information
- 11. Uses hand, voice and face recognition
- 15. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic
- 18. _____ settings help control things like your profile, contact, and other information relating to your account
- 21. Bring Your Own Device