Cyber Awareness

123456789101112
Across
  1. 2. This barrier keeps unwanted network traffic out of your system.
  2. 6. A software update that fixes security vulnerabilities.
  3. 7. Malicious software that locks your files until you pay up.
  4. 8. Malicious software designed to harm or exploit a computer system.
  5. 11. Your first line of defense; make it strong and unique.
  6. 12. Verifying your identity before granting access.
Down
  1. 1. Malicious software disguises itself as something harmless.
  2. 3. It turns your data into a secret code to keep it safe.
  3. 4. Malicious software that secretly gathers information about a user.
  4. 5. A process that turns data into a fixed-length string of characters.
  5. 9. A secure tunnel for your internet traffic, often used to protect privacy.
  6. 10. A copy of your data that you keep safe in case of an emergency.