Across
- 4. someone who uses technical skills to explore, access, or break into computer systems
- 5. fake emails that try to fool you into clicking links or sharing login information
- 7. scrambling data so only someone with the right key can read it
- 8. malicious code that attaches to programs and spreads when those programs run
- 11. tricking people into giving up passwords or sensitive information
- 13. a security professional who uses hacking skills to test and improve defenses
- 17. an attack that floods a site or server with traffic so real users can’t reach it
- 19. any harmful software designed to damage systems, steal data, or cause problems
- 20. using hacking skills to make a political point or support a cause
- 21. a self-spreading program that moves across computers on its own and can clog networks
- 22. written statements that falsely harm someone’s reputation
Down
- 1. the main U.S. law that makes unauthorized computer access a crime
- 2. when someone steals personal information to pretend to be someone else
- 3. redirecting a user to a fake website even when they typed the real one
- 6. text message scams that ask for personal or financial information
- 9. a malicious hacker who breaks into systems for theft, disruption, or profit
- 10. a group of infected computers secretly controlled by an attacker
- 12. investigating digital evidence to figure out what happened in a cyber incident
- 14. getting into a computer system without permission, usually by finding weaknesses to exploit
- 15. identification using physical traits like fingerprints, face, or iris patterns
- 16. technology that figures out a user’s real-world location based on Internet data
- 18. phone calls pretending to be from a real company to steal account details
