Across
- 4. Software designed to detect and destroy computer viruses.
- 8. Potential dangers or malicious activities found on the internet.
- 9. Synthetic media replacing a person's likeness using AI.
- 10. A network security system controlling traffic based on rules.
- 12. A security process using two different verification factors.
- 17. Manipulating people to divulge info or perform actions.
- 18. Extends a private network across public ones for secure data transfer.
- 19. Attempts to gain unauthorized access to damage or disrupt systems.
- 20. Trustworthy and accurate sources of information.
Down
- 1. Protecting computer systems/networks from theft, damage, or disruption.
- 2. Connected to the internet.
- 3. Bullying that occurs over digital devices like phones and computers.
- 5. Potential dangers or hazards.
- 6. The trail of data you create while using the Internet.
- 7. Individuals who exploit weaknesses in computer systems or networks.
- 11. Software intended to damage or disable computers and systems.
- 13. Encoding info so only authorized parties can understand it.
- 14. Data that can be used to identify an individual.
- 15. A strong and unique combination to protect online accounts.
- 16. Online fraud where attackers impersonate to trick you into revealing info.
