CYBERSECURITY

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 2. – Global network connecting systems
  2. 8. – Malicious program that spreads
  3. 10. – Blocking legitimate access to a system
  4. 11. – Converting data into code to protect it
  5. 13. – Unauthorized access to a system
  6. 14. – Unwanted or unsolicited messages
  7. 16. – Legal rules governing online activity
  8. 17. – Protected or secure
  9. 19. – Decoy system to trap hackers
  10. 20. – Information stored digitally
  11. 21. – Deceptive act for financial gain
  12. 23. – Security using fingerprints or retina scans
  13. 25. – Security violation or compromise
  14. 26. – Copy of data for safety
  15. 27. – Software designed to damage or disrupt systems
  16. 28. – Software that secretly monitors activity
  17. 30. – Fraudulent attempt to steal sensitive info
  18. 32. – Malicious software disguised as legitimate
  19. 33. – Connected group of computers
  20. 35. – Non-digital security measures
  21. 37. – Server acting as an intermediary
  22. 38. – Measures to protect systems and data
Down
  1. 1. – Virtual Private Network for secure connections
  2. 3. – Potential danger to digital systems
  3. 4. – Security barrier between networks
  4. 5. – Software protecting against malware
  5. 6. – Weak point in a system
  6. 7. – Permission to enter a system
  7. 9. – Malware demanding payment to unlock files
  8. 12. – Authentication requiring two verification steps
  9. 15. – Verifying identity before access
  10. 18. – Network of infected computers
  11. 22. – Secret key for accessing accounts
  12. 24. – Attempt to damage or steal data
  13. 25. – When security is broken
  14. 29. – Fixing security or system problems
  15. 31. – Person who breaks into systems
  16. 34. – Software recording keystrokes secretly
  17. 35. – Update fixing software vulnerabilities
  18. 36. – Someone secretly gathering information