Across
- 1. A cyber attack that tricks people into giving personal information through fake messages or websites
- 4. Any software designed to harm, damage, or gain unauthorized access to a computer
- 5. The process of converting data into a secret code to protect it
- 8. A self-replicating malware that spreads across networks without needing a file
- 10. Gaining unauthorized access to computer systems or data
- 12. – A security method that requires two forms of verification to access an account
- 13. – Malware that disguises itself as a safe program to trick users into installing it
- 14. The process of proving who you are when logging into a system
- 15. A type of malware that spreads by attaching itself to files and programs
Down
- 2. Software that secretly collects information about a user without their knowledge
- 3. Protecting data from unauthorized access, use, or damage
- 6. A secret word or phrase used to verify a user’s identity
- 7. Malware that locks or encrypts files and demands payment to restore access
- 9. A security system that monitors and controls incoming and outgoing network traffic
- 11. Protecting computer networks from unauthorized access or attacks
