Cybersecurity Crossword

123456789101112131415161718
Across
  1. 4. A strong and unique combination to protect online accounts.
  2. 8. Software designed to detect and destroy computer viruses.
  3. 9. Bullying that occurs over digital devices like phones and computers.
  4. 11. authentication A security process using two different verification factors.
  5. 14. A network security system controlling traffic based on rules.
  6. 15. Data that can be used to identify an individual.
  7. 16. Encoding info so only authorized parties can understand it.
  8. 17. Potential dangers or malicious activities found on the internet.
  9. 18. Protecting computer systems/networks from theft, damage, or disruption.
Down
  1. 1. Manipulating people to divulge info or perform actions.
  2. 2. Synthetic media replacing a person's likeness using AI.
  3. 3. Individuals who exploit weaknesses in computer systems or networks.
  4. 5. Connected to the internet.
  5. 6. Extends a private network across public ones for secure data transfer.
  6. 7. Footprint The trail of data you create while using the Internet.
  7. 9. Attempts to gain unauthorized access to damage or disrupt systems.
  8. 10. Software intended to damage or disable computers and systems.
  9. 12. Trustworthy and accurate sources of information.
  10. 13. Potential dangers or hazards.
  11. 15. Online fraud where attackers impersonate to trick you into revealing info.