Cyber Security by Michaela Erica Arcenal

12345678910111213141516171819202122232425262728293031323334353637383940
Across
  1. 2. Information used to verify identity
  2. 4. A cyberattack that tricks users into revealing personal information
  3. 6. A physical or digital device used for authentication
  4. 7. The science of securing information through codes
  5. 9. Malware that locks files and demands payment to restore access
  6. 11. A method used to convert plain text into coded text
  7. 13. Restricting who can view or use resources
  8. 15. Software designed to damage, disrupt, or gain unauthorized access to a computer system
  9. 16. The act of entering credentials to access a system
  10. 17. Malicious software that secretly collects user information
  11. 22. Permission given to collect or use personal data
  12. 28. Protection of computer networks from intruders
  13. 31. Using multiple methods to verify identity
  14. 33. A security system that monitors and controls network traffic
  15. 34. A fraudulent scheme to steal money or information
  16. 35. Identity verification using fingerprints or face recognition
  17. 36. The process of converting information into coded form
  18. 37. A method of blocking or allowing data based on rules
  19. 38. The protection of personal information from misuse
  20. 39. A security process that uses two methods to verify identity
  21. 40. Fake email messages designed to trick recipients
Down
  1. 1. A security expert who tests systems legally
  2. 3. A short numeric password
  3. 5. Pretending to be a trusted source to deceive users
  4. 8. Software designed to detect and remove viruses
  5. 10. The process of verifying a user’s identity
  6. 12. A person who gains unauthorized access to computer systems
  7. 14. Keeping information secret from unauthorized users
  8. 18. A person who commits crimes using computers
  9. 19. A longer version of a password made of multiple words
  10. 20. Malware disguised as legitimate software to trick users
  11. 21. Simulated cyberattack to test system security
  12. 23. When malicious software enters a system
  13. 24. Confirming the identity of a user
  14. 25. The process of converting coded text back to readable form
  15. 26. A type of malware that spreads and infects systems
  16. 27. A temporary code used for login verification
  17. 29. Malware that spreads without user action
  18. 30. A secret word or phrase used to access a system
  19. 32. Safeguarding personal information from misuse