Name: _______________________

1234567891011121314151617181920
Across
  1. 4. An attempt by hackers to damage or gain unauthorized access to your computer or network.
  2. 6. The process of proving who you are, like using a password or fingerprint.
  3. 7. A program you use to access the internet (like Chrome or Safari).
  4. 12. A copy of important data stored separately to protect against data loss.
  5. 15. Software that helps protect your computer from viruses by detecting and removing them.
  6. 16. _________ AUTHENTICATION - A security process that requires two or more forms of identification to access data.
  7. 18. (2 words) A tool that helps you create and store strong passwords securely.
  8. 20. (2 words)When sensitive information is accessed without permission.
Down
  1. 1. The practice of protecting computers, networks, and data from unauthorized access or attacks.
  2. 2. (2 words)When someone steals your personal information to commit fraud.
  3. 3. (2 words)Tricks used by hackers to manipulate people into giving away confidential information.
  4. 5. : The method of converting information into a code to prevent unauthorized access.
  5. 8. Malware that locks your files and demands payment to unlock them.
  6. 9. : A scam where attackers send fake emails to trick you into providing personal information.
  7. 10. : Someone who tries to gain unauthorized access to computers or networks.
  8. 11. Malicious software designed to harm or exploit computers.
  9. 13. Small data files stored on your computer by websites to remember your preferences.
  10. 14. : A secret word or phrase used to access a computer or service.
  11. 17. : A security system that controls incoming and outgoing network traffic.
  12. 19. : Unwanted or junk email.