Across
- 2. This barrier keeps unwanted network traffic out of your system.
- 6. A software update that fixes security vulnerabilities.
- 7. Malicious software that locks your files until you pay up.
- 8. Malicious software designed to harm or exploit a computer system.
- 11. Your first line of defense; make it strong and unique.
- 12. Verifying your identity before granting access.
Down
- 1. Malicious software disguises itself as something harmless.
- 3. It turns your data into a secret code to keep it safe.
- 4. Malicious software that secretly gathers information about a user.
- 5. A process that turns data into a fixed-length string of characters.
- 9. A secure tunnel for your internet traffic, often used to protect privacy.
- 10. A copy of your data that you keep safe in case of an emergency.
