Cybersecurity Crossword Challenge
Across
- 2. Software that secretly monitors user activity and collects personal information.
- 4. A technique where a fake email or website is used to look like a trusted source.
- 5. Software designed to harm or exploit any device it infects.
- 7. When sensitive information is exposed due to a cyberattack or leak.
- 8. A scam where attackers trick you into sharing personal information.
- 9. A network security system that monitors and controls incoming and outgoing traffic.
Down
- 1. Malware that locks your files and demands payment.
- 3. A tool that encrypts your internet connection, often used for secure browsing.
- 6. The process of scrambling data to keep it secure from unauthorized access.