Sarah Cybersecurity Password
Across
- 2. Horse A download disguised as a program.
- 4. A code that is capable of corrupting the system or destroying data.
- 7. 1 The duplication of data files to at least 2 hard drives simultaneously.
- 8. Hardening Making a computer system more secure by fixing weaknesses so attackers cant get in.
- 11. Security Keeps software and apps from being attacked.
- 13. Unwanted software that secretly installs and puts pop ups on your device.
- 14. Spreads across devices while replicating within a network.
- 15. Backup A backup of daily changed or new files.
Down
- 1. Footprint The collection of data stored online, created while an individual is using the internet.
- 3. Security Protects how data is handled and shared.
- 5. Security Protects data from being changed or stolen.
- 6. Recovery Plans how to restore data after being attacked.
- 9. Backup A complete copy of all data files.
- 10. Security Protects computer networks from hackers and unauthorized access.
- 12. Freedom from being observed or disturbed.