Across
- 3. A security incident where sensitive, confidential, or personal information is accessed, stolen, or disclosed without authorization.
- 4. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- 5. The practice of protecting your digital world from cyber threats.
- 7. Hackers send fake emails pretending to be a trusted source (like your bank), hoping you’ll click on a link or give them your personal info.
Down
- 1. Stops unwanted traffic (like hackers) from getting into your system.
- 2. A type of malicious software (malware) that encrypts a victim's files or locks their computer system, preventing them from accessing their data.
- 6. Scrambles your sensitive data so that even if someone intercepts it, they can’t read it without the key to unlock it.
