Across
- 4. surfing Someone observing your screen or keyboard in public to steal information
- 6. Attempting to get your sensitive information by pretending to be a trustworthy source
- 7. A network security system that monitors and controls incoming and outgoing traffic
- 9. A fake website or communication designed to look real to steal your login information
- 11. A secret code used to access your accounts and devices
- 12. Software that protects your computer from viruses and malware
Down
- 1. Malicious software designed to damage or disrupt your systems
- 2. The practice of protecting your system, greater networks, and your data from digital attacks
- 3. Factor Authentication The practice of verifying your identity using two different methods
- 5. Unauthorized access to your computer or network
- 8. A scam where attackers demand payment to restore access to your data
- 10. Force A method that hackers use to guess your password by trying many combinations
