Cybersecurity Awareness

12345678910
Across
  1. 3. A security system that monitors and controls incoming and outgoing network traffic
  2. 4. A security model that requires strict identity verification for every person and device trying to access resources on a network
  3. 6. Software that secretly gathers information about a user's activities
  4. 8. The process of encoding information to protect it from unauthorized access
  5. 10. Malicious software that misleads users of its true intent by disguising itself as legitimate software
Down
  1. 1. Manipulating people into divulging confidential information
  2. 2. Phishing attacks conducted via SMS messages
  3. 5. A malware designed to deny a user or organization access to files on their computer
  4. 7. A type of online scam that tricks people into sharing sensitive information, such as login credentials and credit card numbers
  5. 9. Small files stored on a user’s system to recognize the user and track preferences