Cybersecurity Challenge: Crack the Code!" πŸš€πŸ”’

123456789101112131415
Across
  1. 1. The process of converting data into a secret code to prevent unauthorized access.
  2. 5. A type of malware disguised as legitimate software to trick users into installing it.
  3. 6. A cyberattack that overwhelms a website with traffic to make it unavailable.
  4. 9. A secret combination of characters used to access accounts securely.
  5. 11. Malicious software designed to harm or exploit computer systems.
  6. 12. A security process requiring two verification methods to access an account.
  7. 13. A program that detects and removes malicious software.
  8. 14. Criminal activities carried out using computers or the internet.
  9. 15. A security system that monitors and controls incoming and outgoing network traffic.
Down
  1. 2. Malicious software that locks a user’s files and demands payment for their release.
  2. 3. Manipulating people into giving up confidential information.
  3. 4. A person who gains unauthorized access to computer systems.
  4. 7. An incident where sensitive information is accessed without authorization.
  5. 8. A cyberattack that tricks people into revealing personal information through fake emails or websites.
  6. 10. A type of malware that secretly gathers information about a person or organization.