Cybersecurity Awareness

12345678910111213141516171819202122232425262728
Across
  1. 3. Secure connection that hides your online activities
  2. 5. Scrambling data to protect it from prying eyes
  3. 7. Software that helps detect and remove malicious programs
  4. 8. Malware disguised as legitimate software
  5. 12. The ability to use or interact with data or systems
  6. 14. Protects your network by blocking certain traffic
  7. 16. A weakness in a system that can be exploited
  8. 21. An extra layer of security requiring two forms of identification
  9. 23. Manipulating people to gain confidential information
  10. 26. A saved copy of data, used in case of data loss
  11. 27. A risk from someone within the organization
  12. 28. A security event that could harm a system or data
Down
  1. 1. Converting scrambled data back into readable form
  2. 2. Pretending to be someone else to deceive or scam
  3. 4. A secret word or phrase used to access your account
  4. 6. Malicious software that demands payment to release data
  5. 9. Fraudulent emails trying to trick you into revealing information
  6. 10. Criminal activities carried out using computers
  7. 11. Username and password combination used to log in
  8. 13. Software that secretly monitors your online activities
  9. 15. Verifying who you are before gaining access
  10. 17. When sensitive data is accessed without authorization
  11. 18. Information collected and stored digitally
  12. 19. A software update that fixes security vulnerabilities
  13. 20. Someone who tries to gain unauthorized access to systems
  14. 22. A type of malware that spreads by copying itself
  15. 24. Following legal and regulatory cybersecurity standards
  16. 25. Harmful software that damages or infiltrates devices