Across
- 3. update that fixes software vulnerabilities
- 5. software designed to harm or exploit systems
- 7. secret word used to access an account
- 9. copy of data stored for recovery
- 11. network barrier that blocks unauthorized access
- 13. secure connection that hides your online activity
- 14. team that monitors and responds to cyber threats
Down
- 1. software that detects and removes malicious programs
- 2. malware that locks files for payment
- 4. extra security layer requiring multiple verifications
- 6. unauthorized access to confidential data
- 8. software that secretly monitors user activity
- 9. network of infected computers controlled remotely
- 10. fraudulent emails that trick users into giving information
- 12. process of converting data into a secure code
