Network Security
Across
- 2. High level permissions that allow a user to install software or change system settings
- 7. Malware that locks your files and demands money to unlock them like holding your data hostage
- 8. A separate saved copy of important files so you can restore them if data is lost
- 10. Rules that decide what different users can see or do on a computer system
- 13. Software that scans for malicious files and removes them before they cause damage
- 16. A login method that requires your password and a code sent to your phone making accounts harder to hack
- 17. A password like 123456 or password that is very easy for attackers to guess
- 20. A fake message pretending to be someone trustworthy asking for your password or personal data
- 21. When a hacker keeps trying many passwords until one finally works
Down
- 1. When a hacker tricks someone into giving away information instead of hacking the system
- 3. A secret word or phrase used to prove who you are and log into your account
- 4. A harmful program that spreads from file to file and computer to computer
- 5. Software that secretly installs itself and causes damage like deleting files or slowing your computer
- 6. The process of verifying your identity like entering a password or using fingerprint unlock
- 9. A program that looks safe but secretly hides harmful code like a fake game that installs malware
- 11. Turns information into unreadable code so intercepted messages cannot be understood
- 12. Ethical hacking used to find weaknesses in a system before criminals do
- 14. Software that secretly watches what you type or the websites you visit and sends it to someone else
- 15. Someone who uses computer skills to access systems sometimes legally and sometimes illegally
- 18. An attack that floods a server with too much traffic so real users cannot access it
- 19. A security barrier that checks data coming in and out of a network like a bouncer letting only safe traffic through