Across
- 1. | Abbreviation for Virtual Private Network, used for secure internet connections.
- 3. | Software that secretly monitors user activity.
- 8. | Faking the sending address of an email to trick recipients.
- 9. | Copy of data stored separately for recovery in case of loss.
- 11. | Malicious tool that records keystrokes.
- 13. | Unwanted or unsolicited emails.
- 14. | Process of converting information into code to prevent unauthorized access.
- 17. | Two-factor authentication, adds extra security to logins.
- 18. | Software designed to damage or gain unauthorized access to a system.
- 19. | Malicious program that spreads itself to other computers.
Down
- 2. | Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- 4. | Program that detects and removes malicious software.
- 5. | Small data stored on a user’s browser to track activity.
- 6. | Security system that controls incoming and outgoing network traffic.
- 7. | A secret word or phrase for authentication.
- 10. | Network of infected computers controlled by a hacker.
- 12. | Malicious software that blocks access to data until a payment is made.
- 15. | Malicious program disguised as legitimate software.
- 16. | A person who gains unauthorized access to data.
- 20. | Multi-factor authentication for added account protection.
