Across
- 4. Process of preparing for and recovering from unexpected events like cyberattacks
- 8. The trail of your activity online
- 9. Protects how organizations share and handle information in daily operations
- 11. Malicious software that attaches to legitimate files, replicating itself, and spreads to other programs and devices
- 13. Malware that locks your files and demands money
- 15. When private information is stolen
Down
- 1. Malicious Software that secretly installs on your device to steal personal data
- 2. Protects data from being accessed, changed, or stolen by unauthorized people
- 3. Process of using additional login methods to accurately identify the correct user from the account
- 5. Protects software and apps from hackers or viruses that could steal or damage data
- 6. A security barrier that blocks unwanted access
- 7. It protects computer networks from hackers and cyberattacks
- 10. Malware disguised as legitimate software, tricking users into installing it to gain unauthorized access
- 12. Self-replicating malware that spreads across networks
- 14. Fake messages that try to trick you into giving information
