Across
- 3. Software that protects your computer from harmful programs.
- 4. Malicious software that locks your files and demands money to unlock them.
- 8. A method of converting data into a code to prevent unauthorized access.
- 12. A secret word or phrase used to access a system or account.
- 13. A voice-based scam where attackers call pretending to be from a trusted source.
- 14. A person who gains unauthorized access to data or systems.
- 15. A network security system that blocks unwanted access while allowing safe communication.
- 16. A type of phishing attack done through SMS or text messages.
Down
- 1. The practice of protecting systems, networks, and data from digital attacks.
- 2. A weakness in software or systems that can be exploited by attackers.
- 5. Malicious software designed to damage or gain unauthorized access to systems.
- 6. Malware disguised as a legitimate program but harmful once opened.
- 7. A short-range wireless technology used to connect devices like headphones and keyboards.
- 9. A group of connected computers and devices that share resources.
- 10. A longer version of a password made up of multiple words.
- 11. A scam where attackers trick you into giving personal or financial information.
