Cybersecurity

1234567891011121314
Across
  1. 3. A type of server that allows the access of data and programs over the Internet instead of your computer’s hard drive.
  2. 5. The amount of data that can pass through a network or part of a network per second.
  3. 9. Protects against code injection attacks and other malicious content on trusted web pages.
  4. 10. Malware that locks access to files and demands a ransom to release them.
  5. 11. Monitors and restricts the sharing of sensitive information to prevent data breaches.
  6. 12. Software that collects user data without consent and sends it to third parties.
  7. 13. Encodes data to keep it safe from unauthorized access.
  8. 14. Software that stops known malware. It’s crucial for catching viruses before they can cause trouble.
Down
  1. 1. Software designed to infect and damage a system or network, including viruses, worms, and trojans.
  2. 2. Malware disguised as harmless software to gain access to a system.
  3. 4. A specific type of cyberattack that exploits the fraudulent use of electronic communications to take advantage of users and collect personal information.
  4. 6. Ensures secure access to cloud apps and keeps an eye on unsanctioned activities.
  5. 7. Any unauthorized attempt to access, alter, steal, or block system or user information.
  6. 8. Acts as a barrier between the network and incoming/outgoing traffic, analyzing and managing web activities.