Across
- 2. Tool used on emails and networks to block spam or suspicious traffic
- 3. Prevention method that ensures people know how to spot a cyber trick
- 5. Software designed to protect your device from malware
- 8. Copies of data needed to recover from a ransomware attack
- 9. Attack that floods a server with requests from many sources
- 11. The process used with 2FA to verify a user's identity
- 12. Tempting downloads or USB sticks to trick someone into giving data
- 14. Prevention method for this threat is being aware of who is watching your screen
- 15. General term for malicious software
- 16. Installing these will fix security holes and vulnerabilities
- 18. A social engineering trick where a person tries to obtain information by making up a fake scenario or story
Down
- 1. Security system that monitors and filters network traffic
- 4. Attack that floods a server with requests, often from a single source
- 6. Malware that locks your files and demands payment
- 7. Sending fake emails to trick a user into clicking a link
- 8. Attack that guesses passwords by trying lots of different combinations
- 10. Accessing a computer system without permission
- 13. A secret set of characters used to secure an account
- 14. A dishonest scheme used to trick people
- 17. Type of password that makes brute force attacks take a very long time
