Cybersecurity 2023

12345678910111213141516171819202122
Across
  1. 4. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  2. 5. A security process that uses an additional factor for verification is called "______-Factor Authentication"
  3. 6. An individual that is authorized to access a system
  4. 8. A _____ email falsely claims to be from a legitimate source, usually with a threat or request for information
  5. 12. Designed to detect and destroy computer viruses
  6. 13. Junk email
  7. 14. Your digital ______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  8. 16. The gaining of unauthorized access to data in a system or computer
  9. 17. Converting information and data into code to protect unauthorized access to sensitive data
  10. 19. Tech used to keep intruders out
  11. 20. Online harassment
  12. 22. A set of changes that fix or improve a software or application
Down
  1. 1. Cybersecurity awareness month
  2. 2. Weakness in a system
  3. 3. A sequence of words used for authentication
  4. 7. Storage for infected files and emails
  5. 9. The fraudulent practice of sending a text message impersonating the head of school in order to induce individuals to reveal personal information or purchase a gift card
  6. 10. Software demanding money to unlock personal information
  7. 11. Uses hand, voice and face recognition
  8. 15. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic
  9. 18. _____ settings help control things like your profile, contact, and other information relating to your account
  10. 21. Bring Your Own Device