Trey cybersecurity

123456789101112131415
Across
  1. 3. When sensitive information is exposed or stolen
  2. 6. The process of converting data into a secure code
  3. 7. A type of malware that spreads by attaching to files
  4. 8. Malware that locks your data and demands money to unlock it
  5. 10. Malware that spreads on its own without needing a file
  6. 12. Software that secretly collects your personal information
  7. 13. A scam where attackers trick you into giving personal info through fake messages
  8. 14. Protection of a computer network from threats
  9. 15. A security method that requires two ways to confirm identity
Down
  1. 1. Software designed to harm or damage a computer
  2. 2. A secret set of characters used to access an account
  3. 4. The trail of data you leave online
  4. 5. A system that blocks unauthorized access to a network
  5. 9. The process of verifying a user’s identity
  6. 11. A person who gains unauthorized access to systems