Jacob’s cybersecurity crossword
Across
- 3. A program that appears harmless but contains malicious code to give a hacker access.
- 5. A network of private computers infected with malicious software and controlled as a group.
- 6. Malware that locks or encrypts your files and demands payment to get them back.
- 8. A security system that monitors and controls incoming and outgoing network traffic.
- 9. The trail of data you leave behind while using the internet.
- 13. The process of verifying the identity of a user or process.
- 14. Short for "malicious software," designed to damage or gain unauthorized access to a computer.
- 15. A piece of code that can copy itself and typically has a detrimental effect, such as corrupting the system.
Down
- 1. A weakness in a computer system that could be exploited by a cyberattack.
- 2. The process of converting information into a secret code to prevent unauthorized access.
- 4. Using human interaction to manipulate people into breaking normal security procedures.
- 7. The correct or acceptable way of communicating on the internet.
- 10. A security process that requires two different forms of identification to access an account.
- 11. Software that secretly records what you do on your computer, like capturing your keystrokes.
- 12. A deceptive email or message designed to trick you into revealing personal information.