Cybersecurity Crossword
Across
- 4. A strong and unique combination to protect online accounts.
- 8. Software designed to detect and destroy computer viruses.
- 9. Bullying that occurs over digital devices like phones and computers.
- 11. authentication A security process using two different verification factors.
- 14. A network security system controlling traffic based on rules.
- 15. Data that can be used to identify an individual.
- 16. Encoding info so only authorized parties can understand it.
- 17. Potential dangers or malicious activities found on the internet.
- 18. Protecting computer systems/networks from theft, damage, or disruption.
Down
- 1. Manipulating people to divulge info or perform actions.
- 2. Synthetic media replacing a person's likeness using AI.
- 3. Individuals who exploit weaknesses in computer systems or networks.
- 5. Connected to the internet.
- 6. Extends a private network across public ones for secure data transfer.
- 7. Footprint The trail of data you create while using the Internet.
- 9. Attempts to gain unauthorized access to damage or disrupt systems.
- 10. Software intended to damage or disable computers and systems.
- 12. Trustworthy and accurate sources of information.
- 13. Potential dangers or hazards.
- 15. Online fraud where attackers impersonate to trick you into revealing info.