Across
- 1. Malware disguised as legitimate software
- 5. A second layer of security for logging in
- 6. Tricking people into revealing confidential info
- 11. A software fix for security vulnerabilities
- 12. A saved copy of your data in case of loss
- 16. Good habits to stay safe online
- 17. Malware that locks your files and demands payment
- 18. Misleading links designed to get your attention
- 21. Verifying your identity before granting access
- 22. Software that detects and removes malicious programs
- 23. A secure connection that hides your online activity
- 24. Malicious software designed to harm or exploit systems
Down
- 2. Software that automatically displays unwanted ads
- 3. Protocol that encrypts data between websites and browsers
- 4. Malware that hides deep in your system
- 7. Scrambling data so only authorized users can read it
- 8. Software that secretly monitors your activity
- 9. A hidden part of the internet not indexed by search engines
- 10. A network of infected devices controlled remotely
- 12. Unauthorized access to data or systems
- 13. Fake emails trying to trick you into giving personal info
- 14. A flaw exploited before developers can fix it
- 15. Pretending to be someone else online
- 19. A secret word or phrase used to access accounts
- 20. A digital barrier that blocks unauthorized access
