Cybersecurity Crossword Puzzle
Across
- 5. Someone who breaks into systems—some for harm, others for good (security testing).
- 6. Harmful software designed to damage, steal, or gain access to systems.
- 8. Fake messages that trick you into giving up passwords or personal info.
- 9. A secret code used to log in and prove identity.
- 10. Malware that spreads by attaching to files or programs when opened.
Down
- 1. Verifying someone’s identity before allowing system access.
- 2. Protecting personal information from misuse and unauthorized access.
- 3. Scrambling data so only authorized users can read it.
- 4. Using two methods (like a password + phone code) to securely confirm identity
- 7. A security barrier that blocks unauthorized network access.