We're All Cyber Superheroes!

12345678910111213141516171819202122232425
Across
  1. 2. A form of malware that when executed, changes, corrupts, or destroys information in a system, then it passes on to other systems and damages those as well
  2. 5. A network of computers that have been infected with a virus and now continuously work to create security breaches
  3. 8. A hacking strategy that relies on user manipulation and exploiting human psychology to carry out attacks (two words)
  4. 11. A form of malware that hijacks your system, encrypts your files, and denies you access until you send a payment to unlock them
  5. 13. Threat detection technology designed to shield users from viruses, spyware, trojans, and worms (two words)
  6. 15. A form of ethical hacking that simulates a cyberattack to look for weaknesses that malicious actors may be able to exploit (two words)
  7. 19. A part of the computer system designed to block unauthorized access and keep intruders out
  8. 20. A term for a wide variety of malicious software used to infect and/or damage systems
  9. 22. The use of unique biological features for digital authentication and access control
  10. 23. Protection from potential harm caused by others
  11. 24. An acronym for a tool that gives a user privacy and anonymity online by connecting to a secure server
  12. 25. Use this to access resources, software, and databases over the Internet and outside the confines of local hardware restrictions
Down
  1. 1. A type of scam where a threat actor poses as a legitimate business or organization in order to trick a victim into clicking on a malicious link or attachment
  2. 3. When a hacker changes the email address or Wi-Fi network name so that it appears to be a trusted source
  3. 4. Someone who uses their information technology knowledge and skill to gain unauthorized access to computers, systems, and data
  4. 6. Converting raw data, known as plaintext, into a code, known as ciphertext, to prevent hackers from being able to understand it if they gain access to it
  5. 7. A group of applications that instruct a computer to carry out a task
  6. 9. Occurs when a hacker successfully breaks into a system, takes control of a network, or exposes personal information (two words)
  7. 10. A piece of audio or video that has been altered to make it seem authentic, often used maliciously to spread false information
  8. 12. An acronym for an authentication tool that requires a combination of two or more credentials to verify a user’s identity for login
  9. 14. A form of malware that replicates itself in order to spread to other computers
  10. 16. A code that takes advantage of a software vulnerability or flaw
  11. 17. A form of malware that throws up unwanted advertisements on your screen
  12. 18. A form of malware used to spy on you and your computer activity
  13. 21. Concerning the proper handling of sensitive data to protect its confidentiality and meet regulatory requirements