Cybersecurity puzzle

12345678910111213141516171819202122232425
Across
  1. 2. A common tactic in scams, creating a sense of immediate action needed.
  2. 8. Online harassment that can breach your mental health
  3. 11. Malware that encrypts files, demanding payment for decryption.
  4. 13. A scam method using emails to trick users into revealing personal information
  5. 16. The process of confirming a user's identity in a security system.
  6. 17. A general term for deceitful practices to gain financial or personal gain.
  7. 20. adding a unique string to a password before hashing it for added security.
  8. 21. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  9. 22. A safer payment method for online purchases due to fraud protection.
  10. 23. A type of malware that attaches itself to programs and corrupts or modifies files.
  11. 24. Data-tracking files that should be disabled to enhance online privacy
  12. 25. Deceptive malware appearing legitimate, often giving remote access to cybercriminals.
Down
  1. 1. A method where hardware is used to record keystrokes and steal passwords.
  2. 3. Malware that secretly observes the user's actions.
  3. 4. Company that mitigated a record-breaking cyberattack, underlining the need for robust online defenses.
  4. 5. Platform where the Python application gateway for malware was distributed, highlighting vigilance in downloading software.
  5. 6. Everything you do on the internet that stays with you, even when you turn off your devices
  6. 7. Harmful software that scammers might install through tech support scams.
  7. 9. Name of the group associated with the intrusion into cryptocurrency platforms, showing the importance of caution with software downloads.
  8. 10. Autonomous malware that replicates and spreads through network vulnerabilities.
  9. 12. Software designed to detect and remove malicious software like viruses and malware.
  10. 14. A popular brand of antivirus software.
  11. 15. Using more than one method of authentication for enhanced security.
  12. 18. When personal information is accessed and stolen by unauthorized individuals
  13. 19. The method of converting passwords into gibberish to protect them in password files.
  14. 23. A tool that encrypts internet traffic and masks IP addresses for enhanced online privacy.