Cyber Security

1234567891011121314151617
Across
  1. 3. A harmful program that can replicate itself and spread to other computers, often damaging files or systems.
  2. 6. Malware that locks or encrypts a user's files and demands payment to restore access.
  3. 8. Theft When someone illegally uses another person's personal information (like their name or credit card) to commit fraud or theft.
  4. 10. A trick where fake emails, messages, or websites try to steal personal information like passwords or credit card numbers.
  5. 11. The process of converting information into a secret code to prevent unauthorized access.
  6. 12. Malicious software designed to harm, exploit, or otherwise illegally access a computer system.
  7. 14. Small pieces of data stored by websites on a user's device to remember information like login details or site preferences.
  8. 15. A security system that blocks unauthorized access to or from a private network.
  9. 17. (Virtual Private Network) A service that creates a secure, encrypted connection over the internet to protect private data and browsing activity.
Down
  1. 1. Authentication A security process where a user must provide two forms of identification to log in, like a password and a code sent to their phone.
  2. 2. Footprint The trail of data a person leaves behind when using the internet, such as posts, comments, and personal information.
  3. 4. A dishonest scheme meant to trick people into giving away money or private information online.
  4. 5. A test used by websites to confirm that a user is a human and not a bot, often by identifying objects in images or typing distorted text.
  5. 7. Gaining unauthorized access to a computer system or network, usually to steal or manipulate information.
  6. 9. Software that secretly gathers information about a user without their knowledge, often for spying or stealing purposes.
  7. 10. Protecting personal information from being accessed or shared without permission.
  8. 13. The act of publicly revealing private information about a person without their consent, often to harm or intimidate them.
  9. 16. Software A program that detects, prevents, and removes malicious software from a computer.