Cybersecurity Awareness Month

1234567891011121314151617181920
Across
  1. 3. Keeping your software and systems current with the latest fixes
  2. 6. A person who uses computers to gain unauthorized access to data
  3. 8. A copy of data stored separately in case the original is lost or damaged
  4. 9. A program that replicates itself and spreads to other computers
  5. 13. Manipulating people into giving up confidential information
  6. 14. A username and password used to verify identity
  7. 16. A deceptive email or message that tricks you into giving information
  8. 19. A type of malware that locks your files and demands payment to unlock them
Down
  1. 1. The action you do to potential phishing attempts
  2. 2. A Device or software that blocks unauthorized access to a network
  3. 4. The process of converting data into a code to prevent unauthorized access
  4. 5. A type of software designed to detect and remove malicious programs
  5. 7. a dishonest scheme used to trick people into giving up information or money
  6. 10. A state where systems and data are protected from threats
  7. 11. A method of confirming your identity using two or more factors
  8. 12. An incident where data is accessed without authorization
  9. 15. Pretending to be someone else to gain access
  10. 17. Software that secretly gathers information about a person or organization
  11. 18. A secret word or phrase used to gain access to a system
  12. 20. A general term for software designed to harm or exploit systems