Across
- 2. A piece of data about your online history that creates a trail of crumbs
- 4. A file or program that appears legitimate but is actually malicious
- 11. Manipulating individuals to divulge confidential information
- 13. An authentication method of verifying a user’s identity using two or more different methods
- 14. A network security system that monitors and controls incoming and outgoing network traffic
- 15. Software that secretly monitors and collects information from a computer
- 16. A method of securing data by converting it into a code
- 17. When bad actors create a fake identity to send phishing emails
Down
- 1. A decoy system set up to attract and analyze cyber attackers
- 3. Protects your computer from viruses
- 5. Unauthorized access by following someone into a secure area
- 6. A type of malware that demands payment to restore access to data
- 7. A software update that fixes security vulnerabilities
- 8. A secret word or phrase used to access a computer system
- 9. Unauthorized access to data in a system
- 10. A method of securing data by converting it into a code
- 12. Software designed to harm or exploit any programmable device
- 18. A scam where a person is tricked into giving personal information