Cybersecurity Crossword

1234567891011121314151617181920
Across
  1. 4. Software designed to detect and destroy computer viruses.
  2. 8. Potential dangers or malicious activities found on the internet.
  3. 9. Synthetic media replacing a person's likeness using AI.
  4. 10. A network security system controlling traffic based on rules.
  5. 12. A security process using two different verification factors.
  6. 17. Manipulating people to divulge info or perform actions.
  7. 18. Extends a private network across public ones for secure data transfer.
  8. 19. Attempts to gain unauthorized access to damage or disrupt systems.
  9. 20. Trustworthy and accurate sources of information.
Down
  1. 1. Protecting computer systems/networks from theft, damage, or disruption.
  2. 2. Connected to the internet.
  3. 3. Bullying that occurs over digital devices like phones and computers.
  4. 5. Potential dangers or hazards.
  5. 6. The trail of data you create while using the Internet.
  6. 7. Individuals who exploit weaknesses in computer systems or networks.
  7. 11. Software intended to damage or disable computers and systems.
  8. 13. Encoding info so only authorized parties can understand it.
  9. 14. Data that can be used to identify an individual.
  10. 15. A strong and unique combination to protect online accounts.
  11. 16. Online fraud where attackers impersonate to trick you into revealing info.