Year 9 cybersecurity 1

12345678910111213141516171819
Across
  1. 3. A type of malware that infects files and spreads to other systems, often damaging files and affecting system performance.
  2. 6. A password that combines letters, numbers, and symbols, is at least 8 characters long, and avoids common words to prevent unauthorized access.
  3. 7. A security system that monitors and controls network traffic, blocking unauthorized access to protect systems from malicious attacks.
  4. 11. A professional who protects networks and systems from hacking, malware, and other threats by monitoring, installing security measures, and educating users.
  5. 12. A security process that requires users to provide two forms of identification to access an account, adding an extra layer of protection.
  6. 13. Unauthorized access to computer systems or networks, often with the intent to steal or modify data.
  7. 14. Software that displays unwanted advertisements on a device, which can slow down the system and pose security risks.
  8. 17. A program designed to detect, prevent, and remove malware, including viruses and spyware, to protect computer systems.
  9. 18. The process of converting data into a secure format to prevent unauthorized access during transmission over networks.
  10. 19. The information and data left behind from a user’s online activities, which can be tracked or accessed by others.
Down
  1. 1. A unique numerical identifier assigned to each device on a network, allowing devices to communicate over the internet or within a local network.
  2. 2. A method of manipulating people into revealing confidential information, often for malicious purposes, by exploiting trust.
  3. 3. A service that encrypts internet connections, making online activities more secure and protecting users' identities and data on public networks.
  4. 4. A text-based interface that allows users to interact with the computer by typing commands rather than using graphical icons.
  5. 5. A tool used to block unwanted and potentially harmful emails, such as phishing attempts or advertisements, from reaching a user’s inbox.
  6. 8. Controls that allow users to manage who can view their profiles, posts, and personal information on social platforms.
  7. 9. A fraudulent attempt to steal personal information by pretending to be a legitimate entity, often using fake emails or messages.
  8. 10. A virtual point used to identify specific services or applications on a networked device, allowing data to flow to and from the device.
  9. 15. Malicious software designed to harm, exploit, or otherwise compromise a computer system, including viruses, adware, and spyware.
  10. 16. A fake public Wi-Fi network set up to steal personal information from users who connect to it.