Cybersecurity puzzle
Across
- 2. A common tactic in scams, creating a sense of immediate action needed.
- 8. Online harassment that can breach your mental health
- 11. Malware that encrypts files, demanding payment for decryption.
- 13. A scam method using emails to trick users into revealing personal information
- 16. The process of confirming a user's identity in a security system.
- 17. A general term for deceitful practices to gain financial or personal gain.
- 20. adding a unique string to a password before hashing it for added security.
- 21. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 22. A safer payment method for online purchases due to fraud protection.
- 23. A type of malware that attaches itself to programs and corrupts or modifies files.
- 24. Data-tracking files that should be disabled to enhance online privacy
- 25. Deceptive malware appearing legitimate, often giving remote access to cybercriminals.
Down
- 1. A method where hardware is used to record keystrokes and steal passwords.
- 3. Malware that secretly observes the user's actions.
- 4. Company that mitigated a record-breaking cyberattack, underlining the need for robust online defenses.
- 5. Platform where the Python application gateway for malware was distributed, highlighting vigilance in downloading software.
- 6. Everything you do on the internet that stays with you, even when you turn off your devices
- 7. Harmful software that scammers might install through tech support scams.
- 9. Name of the group associated with the intrusion into cryptocurrency platforms, showing the importance of caution with software downloads.
- 10. Autonomous malware that replicates and spreads through network vulnerabilities.
- 12. Software designed to detect and remove malicious software like viruses and malware.
- 14. A popular brand of antivirus software.
- 15. Using more than one method of authentication for enhanced security.
- 18. When personal information is accessed and stolen by unauthorized individuals
- 19. The method of converting passwords into gibberish to protect them in password files.
- 23. A tool that encrypts internet traffic and masks IP addresses for enhanced online privacy.