Year 9 cybersecurity 1
Across
- 3. A type of malware that infects files and spreads to other systems, often damaging files and affecting system performance.
- 6. A password that combines letters, numbers, and symbols, is at least 8 characters long, and avoids common words to prevent unauthorized access.
- 7. A security system that monitors and controls network traffic, blocking unauthorized access to protect systems from malicious attacks.
- 11. A professional who protects networks and systems from hacking, malware, and other threats by monitoring, installing security measures, and educating users.
- 12. A security process that requires users to provide two forms of identification to access an account, adding an extra layer of protection.
- 13. Unauthorized access to computer systems or networks, often with the intent to steal or modify data.
- 14. Software that displays unwanted advertisements on a device, which can slow down the system and pose security risks.
- 17. A program designed to detect, prevent, and remove malware, including viruses and spyware, to protect computer systems.
- 18. The process of converting data into a secure format to prevent unauthorized access during transmission over networks.
- 19. The information and data left behind from a user’s online activities, which can be tracked or accessed by others.
Down
- 1. A unique numerical identifier assigned to each device on a network, allowing devices to communicate over the internet or within a local network.
- 2. A method of manipulating people into revealing confidential information, often for malicious purposes, by exploiting trust.
- 3. A service that encrypts internet connections, making online activities more secure and protecting users' identities and data on public networks.
- 4. A text-based interface that allows users to interact with the computer by typing commands rather than using graphical icons.
- 5. A tool used to block unwanted and potentially harmful emails, such as phishing attempts or advertisements, from reaching a user’s inbox.
- 8. Controls that allow users to manage who can view their profiles, posts, and personal information on social platforms.
- 9. A fraudulent attempt to steal personal information by pretending to be a legitimate entity, often using fake emails or messages.
- 10. A virtual point used to identify specific services or applications on a networked device, allowing data to flow to and from the device.
- 15. Malicious software designed to harm, exploit, or otherwise compromise a computer system, including viruses, adware, and spyware.
- 16. A fake public Wi-Fi network set up to steal personal information from users who connect to it.