Cyber Awareness

1234567891011121314151617181920
Across
  1. 5. A method of trial and error used to guess passwords.
  2. 9. Your first line of defense; make it strong and unique.
  3. 11. An attack that overwhelms a server with too many requests, making it unavailable.
  4. 13. A process that turns data into a fixed-length string of characters.
  5. 14. Deception intended for personal gain, often involving financial data.
  6. 15. Pretending to be someone or something else to gain trust.
  7. 17. This barrier keeps unwanted network traffic out of your system.
  8. 18. A sneaky tool that records every keystroke you make.
  9. 19. It turns your data into a secret code to keep it safe.
  10. 20. A software update that fixes security vulnerabilities.
Down
  1. 1. Malicious software disguises itself as something harmless.
  2. 2. A copy of your data that you keep safe in case of an emergency.
  3. 3. Malicious software designed to harm or exploit a computer system.
  4. 4. A vulnerability that is exploited before the developer can fix it.
  5. 6. Malicious software that locks your files until you pay up.
  6. 7. A type of cyberattack that tricks you into giving away personal information.
  7. 8. Verifying your identity before granting access.
  8. 10. A secure tunnel for your internet traffic, often used to protect privacy.
  9. 12. Manipulating people into giving up confidential information.
  10. 16. Malicious software that secretly gathers information about a user.