Jocelyn M Cybersecurity Crossword

123456789101112131415
Across
  1. 4. Process of preparing for and recovering from unexpected events like cyberattacks
  2. 8. The trail of your activity online
  3. 9. Protects how organizations share and handle information in daily operations
  4. 11. Malicious software that attaches to legitimate files, replicating itself, and spreads to other programs and devices
  5. 13. Malware that locks your files and demands money
  6. 15. When private information is stolen
Down
  1. 1. Malicious Software that secretly installs on your device to steal personal data
  2. 2. Protects data from being accessed, changed, or stolen by unauthorized people
  3. 3. Process of using additional login methods to accurately identify the correct user from the account
  4. 5. Protects software and apps from hackers or viruses that could steal or damage data
  5. 6. A security barrier that blocks unwanted access
  6. 7. It protects computer networks from hackers and cyberattacks
  7. 10. Malware disguised as legitimate software, tricking users into installing it to gain unauthorized access
  8. 12. Self-replicating malware that spreads across networks
  9. 14. Fake messages that try to trick you into giving information