Across
- 4. You should install this on your computer to detect and remove malicious software
- 8. The process of proving your identity with a username and password
- 10. Software that is designed to disrupt, damage, or gain unauthorized access to your computer
- 12. ___________ backup - A way to protect important files by saving copies offsite or in the cloud
- 14. A set of rules created to ensure security, such as not reusing passwords
Down
- 1. Emails pretending to be from legitimate sources to steal personal info
- 2. This type of "attack" involves tricking people into giving away personal information
- 3. "Public ________ should not be used for sensitive tasks like banking."
- 4. A software designed to protect against malicious software
- 5. A security measure that sends a code to your phone to verify your login
- 6. “_______ encryption” - Technology that scrambles data so it can only be read by authorized users
- 7. What you should never share with others, even if they seem trustworthy
- 9. A strong, unique _______ should be used for each account
- 11. An attack where hackers encrypt your data and demand money to unlock it
- 13. "_____ your devices regularly" - Important action to prevent unauthorized access