Cybersecurity Awareness Crossword

123456789101112131415161718
Across
  1. 2. A piece of data about your online history that creates a trail of crumbs
  2. 4. A file or program that appears legitimate but is actually malicious
  3. 11. Manipulating individuals to divulge confidential information
  4. 13. An authentication method of verifying a user’s identity using two or more different methods
  5. 14. A network security system that monitors and controls incoming and outgoing network traffic
  6. 15. Software that secretly monitors and collects information from a computer
  7. 16. A method of securing data by converting it into a code
  8. 17. When bad actors create a fake identity to send phishing emails
Down
  1. 1. A decoy system set up to attract and analyze cyber attackers
  2. 3. Protects your computer from viruses
  3. 5. Unauthorized access by following someone into a secure area
  4. 6. A type of malware that demands payment to restore access to data
  5. 7. A software update that fixes security vulnerabilities
  6. 8. A secret word or phrase used to access a computer system
  7. 9. Unauthorized access to data in a system
  8. 10. A method of securing data by converting it into a code
  9. 12. Software designed to harm or exploit any programmable device
  10. 18. A scam where a person is tricked into giving personal information