Across
- 2. Information used to verify identity
- 4. A cyberattack that tricks users into revealing personal information
- 6. A physical or digital device used for authentication
- 7. The science of securing information through codes
- 9. Malware that locks files and demands payment to restore access
- 11. A method used to convert plain text into coded text
- 13. Restricting who can view or use resources
- 15. Software designed to damage, disrupt, or gain unauthorized access to a computer system
- 16. The act of entering credentials to access a system
- 17. Malicious software that secretly collects user information
- 22. Permission given to collect or use personal data
- 28. Protection of computer networks from intruders
- 31. Using multiple methods to verify identity
- 33. A security system that monitors and controls network traffic
- 34. A fraudulent scheme to steal money or information
- 35. Identity verification using fingerprints or face recognition
- 36. The process of converting information into coded form
- 37. A method of blocking or allowing data based on rules
- 38. The protection of personal information from misuse
- 39. A security process that uses two methods to verify identity
- 40. Fake email messages designed to trick recipients
Down
- 1. A security expert who tests systems legally
- 3. A short numeric password
- 5. Pretending to be a trusted source to deceive users
- 8. Software designed to detect and remove viruses
- 10. The process of verifying a user’s identity
- 12. A person who gains unauthorized access to computer systems
- 14. Keeping information secret from unauthorized users
- 18. A person who commits crimes using computers
- 19. A longer version of a password made of multiple words
- 20. Malware disguised as legitimate software to trick users
- 21. Simulated cyberattack to test system security
- 23. When malicious software enters a system
- 24. Confirming the identity of a user
- 25. The process of converting coded text back to readable form
- 26. A type of malware that spreads and infects systems
- 27. A temporary code used for login verification
- 29. Malware that spreads without user action
- 30. A secret word or phrase used to access a system
- 32. Safeguarding personal information from misuse
