CyberSecurity

123456789101112131415
Across
  1. 4. The use of physical characteristics, such as fingerprints, to verify identity.
  2. 5. A copy of data stored separately to protect against data loss.
  3. 8. Software that secretly monitors and collects information about users.
  4. 11. A service that encrypts your internet connection and hides your IP address.
  5. 12. A type of malware that threatens to publish or block access to data unless a ransom is paid.
  6. 14. A type of cyber attack that attempts to trick individuals into providing sensitive information.
Down
  1. 1. The process of verifying the identity of a user or device.
  2. 2. The practice of protecting systems, networks, and programs from digital attacks.
  3. 3. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  4. 6. Software designed to detect and destroy computer viruses.
  5. 7. A secret word or phrase used to gain access to a system.
  6. 9. A network security device that monitors and filters incoming and outgoing network traffic.
  7. 10. The process of converting information or data into a code to prevent unauthorized access.
  8. 13. Unwanted or unsolicited email messages.
  9. 15. An individual who uses technical skills to gain unauthorized access to systems.