CYBERSECURITY CROSSWORD PUZZLE
Across
- 3. The process of converting data into a coded format to prevent unauthorized access.
- 4. Malicious software designed to damage or disrupt systems.
- 6. A network security device that monitors and filters incoming and outgoing traffic.
- 7. A cyberattack method that tricks users into revealing sensitive information.
- 8. A copy of data kept in case the original is lost or damaged.
Down
- 1. Software that secretly monitors and collects user information.
- 2. Secure connection method over the internet, often used for privacy.
- 5. A self-replicating program that infects files or systems.
- 7. An update to fix software vulnerabilities.
- 9. A secret string used for authentication.