Cybersecurity

123456789101112131415
Across
  1. 3. – Turning information into code so other people can’t read it.
  2. 6. – A secret word you use to log into accounts.
  3. 9. – A system that helps block hackers from getting into your network.
  4. 10. – Software that finds and deletes viruses.
  5. 12. – Locks your stuff and makes you pay money to get it back.
  6. 14. Footprint – The trail of stuff you leave online.
  7. 15. Horse – Malware that looks safe but is actually dangerous.
Down
  1. 1. – When someone tricks you into giving your info through fake emails or texts.
  2. 2. – Software that secretly watches what you do.
  3. 4. – Any kind of bad software that can harm your device.
  4. 5. Authentication – When you need two steps to log in, like a password and a code.
  5. 7. Security – Keeping a network safe from hackers.
  6. 8. – A bad program that spreads through files and can mess up your computer.
  7. 11. Breach – When someone steals private information.
  8. 13. – Malware that spreads by itself without needing anything else.