Cybersecurity and You

12345678910111213141516171819
Across
  1. 1. A security process that verifies a person's identity based on their unique physical or behavioral characteristics.
  2. 3. The process of gathering and measuring information from various sources.
  3. 7. Software that secretly gathers information about a person or organization without their knowledge.
  4. 9. A type of malware that self-replicates and spreads to other files and systems.
  5. 10. Prejudice in favor of or against one thing, person, or group compared with another, usually in an unfair way.
  6. 12. Deliberate malicious attempts to breach an organization's or individual's information system.
  7. 14. Information that can be used to identify, contact, or locate a single person.
  8. 19. A security method requiring a user to provide two or more verification factors to gain access.
Down
  1. 2. A subset of MFA that requires exactly two different authentication factors.
  2. 4. The practice of protecting systems, networks, and programs from digital attacks.
  3. 5. The fraudulent practice of sending emails or other messages to deceive individuals into revealing personal information.
  4. 6. The trail of data you create while using the internet.
  5. 8. The process of verifying the identity of a user or system.
  6. 11. The process of reviewing a person's social media accounts as part of a background check.
  7. 13. A trial-and-error method used to guess a password or login information.
  8. 15. Bias Systematic errors in an AI's output due to flawed assumptions in the machine learning process.
  9. 16. A set of rules or instructions a computer follows to solve a problem or complete a task.
  10. 17. A type of malware that locks a user's files and demands a ransom for their release.
  11. 18. Software designed to cause damage or gain unauthorized access to a computer system.