AE MODULE 7 - CYBER SECURITY

1234567891011121314151617181920212223
Across
  1. 1. Crime that involves a computer and/or a network
  2. 4. Someone who uses a computer to gain access to systems or networks
  3. 6. Malicious attempts by hackers to damage, steal, or destroy a computer
  4. 8. Software that allows an attacker to obtain information on another computer
  5. 9. Links two or more devices
  6. 10. Descriptive data that contains information about other data
  7. 12. In 1988, Robert __________ unleashed a malicious computer program
  8. 14. Positions ideal for individuals with more than five years of experience
  9. 19. Web browser feature
  10. 20. Do not share ____________ across multiple sites
  11. 22. Internet connection that encrypts traffic from a device to a private network
  12. 23. software designed to disrupt, damage, or gain unauthorized access to a computer
Down
  1. 2. Online harassment that uses electronic communication
  2. 3. Attacker sends fraudulent emails to deceive someone into revealing information
  3. 5. , Describes the digital environment in which computer networks communicate
  4. 7. A type of malicious software
  5. 11. Someone who uses the internet to cause harm to a victim
  6. 13. ___________ engineering is when an attacker manipulates someone into revealing information
  7. 15. Software that automatically displays or downloads advertising material
  8. 16. Store information across pages within the site
  9. 17. A trail of data intentionally left behind by a user
  10. 18. Personally identifiable information
  11. 21. A standalone self-replicating software application that invades and destroys computers