Landon cybersecurity puzzle
Across
- 2. A security system that blocks or allows network traffic based on safety rules.
- 4. A secret set of characters used to access accounts or devices.
- 6. Security — Protecting a computer network from unauthorized access or attacks.
- 7. Security — Protecting data from being accessed, altered, or destroyed by unauthorized users.
- 9. A scam where attackers trick you into giving personal information through fake emails or websites.
- 10. Malware that spreads on its own across networks without needing a file or user action.
- 13. A type of malware that spreads by attaching itself to files and activates when the file is opened.
- 14. The process of converting data into a coded form so only authorized users can read it.
- 15. Any harmful software designed to damage, disrupt, or gain unauthorized access to a device or system.
Down
- 1. Authentication (2FA) — A security method that requires two forms of verification, like a password and a code sent to your phone.
- 3. A hidden program that gives hackers control over a system while staying undetected.
- 5. Backup — Saving copies of your files in case the original data is lost or damaged.
- 8. Malware that locks or threatens your data and demands payment to restore access.
- 11. Citizenship — Using technology responsibly, safely, and respectfully online.
- 12. Software that secretly monitors your activity and collects personal information.