Across
- 3. When sensitive information is exposed after a security failure, it’s a data ______.
- 5. Always ______ your software to the latest version to fix bugs and stay secure!
- 10. Always use a password _______ to store and organize your passwords safely!
- 11. Bad software installed on a computer to damage or harm it. Examples include viruses, worms, trojans, spyware, ransomware, etc.
- 12. __________ is a type of malware that locks your files and demands payment to unlock them.
- 14. When malicious threat actors disguise themselves as a trusted source to deceive you, it's called ________.
- 15. Technology that scrambles your data so it can only be read by those authorized is called __________.
- 19. When malicious threat actors create a fake email or website to trick you it is called ________.
- 20. Technology that enables machines to mimic human intelligence, learning, and decision-making is known as __.
Down
- 1. When hackers pretend to be a trusted entity to manipulate you into giving up sensitive information or access unauthorized systems, it’s called ______ engineering.
- 2. A fake video, image, or audio created using AI to impersonate someone is known as a ________.
- 4. A ________ is a security system that blocks unauthorized access to your computer or network.
- 6. Always use long and unique _________ for each of your accounts.
- 7. Leaving a tempting item, like a free download or USB, to trick people into installing malware is called _______.
- 8. If you receive a strange text message asking for personal info, it might be ________ (SMS Phishing).
- 9. When bad threat actors use a QR code to trick you into visiting a malicious site, it’s called ________.
- 13. Multi-factor Authentication, or ___, helps protect your account by adding another layer of security.
- 16. Open source ____________ is when cybercriminals exploit publicly available information to build a profile about a target.
- 17. A phone call that tricks you into sharing personal information is a form of voice phishing called _______.
- 18. A ___ is a private network that makes your internet activity anonymous (abbreviation).