Across
- 4. A hidden way to get into a system later
- 6. A system that blocks unwanted network access
- 8. Proving a user is who they say they are
- 10. A hacker who helps improve security
- 11. An attack that overloads a website so it stops working
- 13. A hacker who is somewhere in between good and bad
- 14. Getting into a computer system without permission
- 15. Software that secretly watches what a user does
- 19. Important systems like power or hospitals that must stay running
- 20. Fake messages used to trick people into giving information
- 22. A group of infected devices controlled by a hacker
- 23. A program that spreads by attaching itself to other files
- 24. A weakness in a system that can be exploited
Down
- 1. Protecting systems, networks, and data from attacks
- 2. Scrambling data so only authorized users can read it
- 3. Harmful software made to damage or steal data
- 5. A group that responds to cybersecurity emergencies
- 7. Tricking people into giving access or information
- 9. Using body features like fingerprints for security
- 10. A program that spreads on its own through networks
- 12. Software that locks files and demands money to unlock them
- 16. A hacker who breaks the law and causes harm
- 17. Hacking to support a political or social cause
- 18. Software that looks safe but secretly does something harmful
- 20. A software update that fixes security problems
- 21. Using someone else’s personal information for fraud
