Across
- 2. – Global network connecting systems
- 8. – Malicious program that spreads
- 10. – Blocking legitimate access to a system
- 11. – Converting data into code to protect it
- 13. – Unauthorized access to a system
- 14. – Unwanted or unsolicited messages
- 16. – Legal rules governing online activity
- 17. – Protected or secure
- 19. – Decoy system to trap hackers
- 20. – Information stored digitally
- 21. – Deceptive act for financial gain
- 23. – Security using fingerprints or retina scans
- 25. – Security violation or compromise
- 26. – Copy of data for safety
- 27. – Software designed to damage or disrupt systems
- 28. – Software that secretly monitors activity
- 30. – Fraudulent attempt to steal sensitive info
- 32. – Malicious software disguised as legitimate
- 33. – Connected group of computers
- 35. – Non-digital security measures
- 37. – Server acting as an intermediary
- 38. – Measures to protect systems and data
Down
- 1. – Virtual Private Network for secure connections
- 3. – Potential danger to digital systems
- 4. – Security barrier between networks
- 5. – Software protecting against malware
- 6. – Weak point in a system
- 7. – Permission to enter a system
- 9. – Malware demanding payment to unlock files
- 12. – Authentication requiring two verification steps
- 15. – Verifying identity before access
- 18. – Network of infected computers
- 22. – Secret key for accessing accounts
- 24. – Attempt to damage or steal data
- 25. – When security is broken
- 29. – Fixing security or system problems
- 31. – Person who breaks into systems
- 34. – Software recording keystrokes secretly
- 35. – Update fixing software vulnerabilities
- 36. – Someone secretly gathering information
