Across
- 3. When sensitive information is exposed or stolen
- 6. The process of converting data into a secure code
- 7. A type of malware that spreads by attaching to files
- 8. Malware that locks your data and demands money to unlock it
- 10. Malware that spreads on its own without needing a file
- 12. Software that secretly collects your personal information
- 13. A scam where attackers trick you into giving personal info through fake messages
- 14. Protection of a computer network from threats
- 15. A security method that requires two ways to confirm identity
Down
- 1. Software designed to harm or damage a computer
- 2. A secret set of characters used to access an account
- 4. The trail of data you leave online
- 5. A system that blocks unauthorized access to a network
- 9. The process of verifying a user’s identity
- 11. A person who gains unauthorized access to systems
