Across
- 5. A method of trial and error used to guess passwords.
- 9. Your first line of defense; make it strong and unique.
- 11. An attack that overwhelms a server with too many requests, making it unavailable.
- 13. A process that turns data into a fixed-length string of characters.
- 14. Deception intended for personal gain, often involving financial data.
- 15. Pretending to be someone or something else to gain trust.
- 17. This barrier keeps unwanted network traffic out of your system.
- 18. A sneaky tool that records every keystroke you make.
- 19. It turns your data into a secret code to keep it safe.
- 20. A software update that fixes security vulnerabilities.
Down
- 1. Malicious software disguises itself as something harmless.
- 2. A copy of your data that you keep safe in case of an emergency.
- 3. Malicious software designed to harm or exploit a computer system.
- 4. A vulnerability that is exploited before the developer can fix it.
- 6. Malicious software that locks your files until you pay up.
- 7. A type of cyberattack that tricks you into giving away personal information.
- 8. Verifying your identity before granting access.
- 10. A secure tunnel for your internet traffic, often used to protect privacy.
- 12. Manipulating people into giving up confidential information.
- 16. Malicious software that secretly gathers information about a user.
