Cyber Tricks and Treats

1234567891011121314151617
Across
  1. 3. What you use to login in, but should be unique and complex for each account
  2. 4. The cyber equivalent of a stake through the heart, used to remove viruses
  3. 6. A virtual private network, protecting your data while you surf the web
  4. 7. A digital skeleton key that can unlock your secure account
  5. 9. A wireless connection standard, like a witch's cauldron of swirling energy
  6. 11. A malevolent program disguised as a harmless application, like a wooden horse
  7. 12. A "ghost network" created by hackers to trick you into connecting to it
  8. 15. A sweet treat that hackers can use to track your online activities
  9. 17. The "I" in the CIA triad, protecting your data from unauthorized modifications
Down
  1. 1. Like a ghost in your machine, it is a type of malicious software that hides in plain sight
  2. 2. What you should always do with your software to protect it from new cyber ghouls
  3. 5. The most frightening kind of malware that holds your computer hostage for a ransom
  4. 6. When you're tricked into revealing sensitive information over the phone
  5. 8. A web address, but you should hover over a suspicious one before you "treat" it with a click
  6. 10. A security measure that stands guard like a sentry against unauthorized access
  7. 13. The "treat" that protects your data from prying eyes
  8. 14. A malicious program that replicates itself, like a zombie spreading a virus
  9. 16. A sneaky attack that pretends to be a legitimate source to steal your information