Across
- 3. Secure connection that hides your online activities
- 5. Scrambling data to protect it from prying eyes
- 7. Software that helps detect and remove malicious programs
- 8. Malware disguised as legitimate software
- 12. The ability to use or interact with data or systems
- 14. Protects your network by blocking certain traffic
- 16. A weakness in a system that can be exploited
- 21. An extra layer of security requiring two forms of identification
- 23. Manipulating people to gain confidential information
- 26. A saved copy of data, used in case of data loss
- 27. A risk from someone within the organization
- 28. A security event that could harm a system or data
Down
- 1. Converting scrambled data back into readable form
- 2. Pretending to be someone else to deceive or scam
- 4. A secret word or phrase used to access your account
- 6. Malicious software that demands payment to release data
- 9. Fraudulent emails trying to trick you into revealing information
- 10. Criminal activities carried out using computers
- 11. Username and password combination used to log in
- 13. Software that secretly monitors your online activities
- 15. Verifying who you are before gaining access
- 17. When sensitive data is accessed without authorization
- 18. Information collected and stored digitally
- 19. A software update that fixes security vulnerabilities
- 20. Someone who tries to gain unauthorized access to systems
- 22. A type of malware that spreads by copying itself
- 24. Following legal and regulatory cybersecurity standards
- 25. Harmful software that damages or infiltrates devices