Cyber Security
Across
- 4. ethics being authorized to attempt to gain unauthorized access to a computer,
- 6. scramble,
- 7. the practice of encoding information so only authorized people can read it,
- 9. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit care numbers,
- 10. the practice of protecting systems networks, and programs from digital attacks,
- 11. footprint a data trail you unintentionally leave online,
- 12. hat hackers have permission to hack a system to discover the systems vulnerabilities,
Down
- 1. the practice of solving and writing encryptions,
- 2. a type of malicious software designed to block access to a computer system until a sum of money is paid,
- 3. hacking to promote a political agenda or social change,
- 5. a form of protection for intellectual property usually applying to artistic works,
- 7. the use of electronic communication to bully a person,
- 8. literacy having the ability to find information evaluate information credibility and use information effectively,