Across
- 3. What you use to login in, but should be unique and complex for each account
- 4. The cyber equivalent of a stake through the heart, used to remove viruses
- 6. A virtual private network, protecting your data while you surf the web
- 7. A digital skeleton key that can unlock your secure account
- 9. A wireless connection standard, like a witch's cauldron of swirling energy
- 11. A malevolent program disguised as a harmless application, like a wooden horse
- 12. A "ghost network" created by hackers to trick you into connecting to it
- 15. A sweet treat that hackers can use to track your online activities
- 17. The "I" in the CIA triad, protecting your data from unauthorized modifications
Down
- 1. Like a ghost in your machine, it is a type of malicious software that hides in plain sight
- 2. What you should always do with your software to protect it from new cyber ghouls
- 5. The most frightening kind of malware that holds your computer hostage for a ransom
- 6. When you're tricked into revealing sensitive information over the phone
- 8. A web address, but you should hover over a suspicious one before you "treat" it with a click
- 10. A security measure that stands guard like a sentry against unauthorized access
- 13. The "treat" that protects your data from prying eyes
- 14. A malicious program that replicates itself, like a zombie spreading a virus
- 16. A sneaky attack that pretends to be a legitimate source to steal your information
