Cybersecurity
Across
- 4. the process of taking plaintext and converting it into a format that is not human-readable
- 7. any potential change or disruption of a computer network.
- 9. Any crime committed over a connected device, such as a cellphone,
- 10. prevent undesirable traffic from entering into a network.
- 11. protected strings of characters in unique combinations that no one can easily guess.
- 12. Phishing is a technique used to gain personal or sensitive information from a user
- 13. theft the process of stealing your personal information such as your social security number or driver's license to open a bank account or apply for a credit card.
Down
- 1. a user's physical characteristics.
- 2. protect networked systems and all of the data from unauthorized use or harm
- 3. software designed to harm or exploit any programmable device, service, or network.
- 5. insulting, harassing, or threatening anyone using the Internet via email, instant messaging, and so on.
- 6. the code of responsible behavior on the computer as well as on the Internet.
- 8. an activity that intrudes into your system or gains unauthorized access to your accounts.