Sarah Cybersecurity Password

123456789101112131415
Across
  1. 2. Horse A download disguised as a program.
  2. 4. A code that is capable of corrupting the system or destroying data.
  3. 7. 1 The duplication of data files to at least 2 hard drives simultaneously.
  4. 8. Hardening Making a computer system more secure by fixing weaknesses so attackers cant get in.
  5. 11. Security Keeps software and apps from being attacked.
  6. 13. Unwanted software that secretly installs and puts pop ups on your device.
  7. 14. Spreads across devices while replicating within a network.
  8. 15. Backup A backup of daily changed or new files.
Down
  1. 1. Footprint The collection of data stored online, created while an individual is using the internet.
  2. 3. Security Protects how data is handled and shared.
  3. 5. Security Protects data from being changed or stolen.
  4. 6. Recovery Plans how to restore data after being attacked.
  5. 9. Backup A complete copy of all data files.
  6. 10. Security Protects computer networks from hackers and unauthorized access.
  7. 12. Freedom from being observed or disturbed.