2025 Cybersecurity Awareness Month

123456789101112131415161718
Across
  1. 2. Fake system set up to lure hackers.
  2. 3. Unauthorized access to data or systems
  3. 6. Fake emails or messages to steal information
  4. 7. Malware that locks files and demands payment.
  5. 9. Code used to take advantage of a vulnerability.
  6. 12. Hacker intercepts communication between two parties.
  7. 16. Securing data by converting it into unreadable code.
  8. 17. Encrypts internet traffic for secure browsing
Down
  1. 1. Authentication Verifying identity using two methods.
  2. 4. EU law protecting personal data privacy.
  3. 5. Security barrier between trusted and untrusted networks.
  4. 8. Process of verifying a user’s identity.
  5. 10. Username and password for authentication.
  6. 11. Malicious code that spreads through files or programs
  7. 13. Software that protects against malicious programs.
  8. 14. Malware disguised as legitimate software.
  9. 15. Isolated environment for testing suspicious files
  10. 18. Security rules for handling credit card data.