Cybersecurity
Across
- 2. Software that secretly collects user information
- 6. Verifying the identity of a user or device
- 7. A small file stored on your device by websites you visit
- 10. A type of malware that replicates and spreads to other programs
- 11. A secret string of characters used to access a system
- 12. A person who gains unauthorized access to systems
- 14. A type of scam where attackers trick users into revealing information
- 17. A type of malware disguised as legitimate software
- 18. Software designed to detect and remove malicious programs
- 20. A program that records keystrokes to steal data
Down
- 1. A security process requiring two different authentication methods
- 3. A software update that fixes security vulnerabilities
- 4. ENGINEERING Manipulating people into revealing confidential information
- 5. Software designed to harm or exploit any device or network
- 8. The process of converting data into a coded form
- 9. An incident where data is accessed without authorization
- 13. A network security system that monitors and controls traffic
- 15. A copy of data stored to prevent loss
- 16. A network of infected computers under a hacker’s control
- 19. A secure connection over the internet to protect data