Across
- 4. A self-replicating type of malware that spreads across networks without human intervention, often causing damage or disruption.
- 8. the fraudulent practice of sending emails or text messages purpretending porting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- 9. Good practices and habits for maintaining cybersecurity, such as keeping software up to date, using strong passwords, and being cautious of suspicious emails or links.
- 12. A type of malware disguised as legitimate software, which appears harmless but actually performs malicious actions when executed.
- 13. The process of converting encrypted data back into its original form using a decryption key or algorithm.
- 15. A strong, complex password that is difficult for attackers to guess or crack, typically consisting of a combination of letters, numbers, and special characters.
- 16. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 17. The ethical principles and guidelines governing acceptable behavior and conduct in cyberspace, including respect for privacy, intellectual property rights, and online safety.
- 19. Short for malicious software, malware is any software intentionally designed to cause damage to computer systems, steal data, or disrupt operations.
- 20. The practice of protecting computer systems, networks, and data from digital attacks, theft, and damage.
- 23. The process of reacting to and managing cybersecurity incidents, such as data breaches or cyberattacks, to minimize damage and restore normal operations.
- 26. A security process that requires users to provide two different forms of identification before accessing an account or system, typically a password and a unique code sent to a mobile device.
Down
- 1. A type of malware that infects computer systems by attaching itself to files or programs and replicating when executed.
- 2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- 3. Measures and practices implemented to protect computer networks from unauthorized access, misuse, or disruption.
- 5. The process of verifying the identity of users or devices attempting to access a system or network.
- 6. the process of converting information or data into secret code, especially to prevent unauthorized access
- 7. A person who uses technical skills to gain unauthorized access to computer systems or networks, often for malicious purposes.
- 10. Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
- 11. A weakness or flaw in computer systems, networks, or software that could be exploited by attackers to gain unauthorized access or cause harm.
- 13. The trail of digital information or data left behind by an individual's online activities, including social media posts, website visits, and online purchases.
- 14. The use of digital communication technologies to harass, intimidate, or bully individuals or groups, often through social media, messaging apps, or online forums.
- 18. The process of granting or denying access to specific resources or services based on user credentials and permissions.
- 21. attack an attempt by a hacker or hackers to infiltrate or damage a computer network or system
- 22. Awareness Knowledge and understanding of cybersecurity risks, best practices, and strategies for protecting against digital threats.
- 24. the gaining of unauthorized access to data in a system or computer
- 25. A software update intended to fix vulnerabilities or bugs in computer programs, often issued by software vendors to improve security.