Landon cybersecurity puzzle

123456789101112131415
Across
  1. 2. A security system that blocks or allows network traffic based on safety rules.
  2. 4. A secret set of characters used to access accounts or devices.
  3. 6. Security — Protecting a computer network from unauthorized access or attacks.
  4. 7. Security — Protecting data from being accessed, altered, or destroyed by unauthorized users.
  5. 9. A scam where attackers trick you into giving personal information through fake emails or websites.
  6. 10. Malware that spreads on its own across networks without needing a file or user action.
  7. 13. A type of malware that spreads by attaching itself to files and activates when the file is opened.
  8. 14. The process of converting data into a coded form so only authorized users can read it.
  9. 15. Any harmful software designed to damage, disrupt, or gain unauthorized access to a device or system.
Down
  1. 1. Authentication (2FA) — A security method that requires two forms of verification, like a password and a code sent to your phone.
  2. 3. A hidden program that gives hackers control over a system while staying undetected.
  3. 5. Backup — Saving copies of your files in case the original data is lost or damaged.
  4. 8. Malware that locks or threatens your data and demands payment to restore access.
  5. 11. Citizenship — Using technology responsibly, safely, and respectfully online.
  6. 12. Software that secretly monitors your activity and collects personal information.