Cybersecurity and Common Online Threats

12345678910
Across
  1. 2. A weakness that can be exploited by cybercriminals
  2. 3. Engineering A manipulation technique that tricks people into giving away confidential information.
  3. 5. The practice of protecting computers, networks, and data from digital attacks or unauthorized access.
  4. 7. A kind of malware that locks your files and demands payment to unlock them.
  5. 9. The process of converting information into a secure code to prevent unauthorized access.
  6. 10. A type of scam where someone pretends to be trustworthy to steal personal information.
Down
  1. 1. Software designed to harm or disrupt computers or steal data.
  2. 4. The quality of being real or genuine.
  3. 6. Software that secretly tracks your online activity or gathers personal data.
  4. 8. To weaken or harm something, especially security or privacy.