Cybersecurity Crossword
Across
- 1. Requiring more than one form of verification. ____________ authentication
- 9. A network security system that monitors and controls traffic.
- 11. The process of verifying identity before granting access.
- 12. The process of converting data into a secure code.
- 16. A secret string of characters used for authentication.
- 19. The practice of protecting systems, networks, and programs from attacks.
Down
- 2. Technology simulating human intelligence, used in modern cybersecurity.
- 3. Malicious software disguised as legitimate software.
- 4. Malware that locks files and demands payment.
- 5. A scam using fake emails or messages to trick people into revealing information.
- 6. A clickable reference to another webpage or document.
- 7. Phishing conducted through SMS text messages
- 8. Software designed to harm or exploit systems.
- 10. A type of malware that replicates itself by infecting other programs.
- 11. Software that detects and removes malicious programs.
- 13. A well-known security awareness training platform.
- 14. A secure tunnel for internet traffic, stands for Virtual Private Network.
- 15. An attempt to damage, steal, or disrupt digital systems.
- 17. Manipulating people into revealing confidential information. ________ engineering
- 18. A hidden method of bypassing normal authentication.