AE MODULE 7 - CYBER SECURITY

1234567891011121314151617181920212223
Across
  1. 2. Positions ideal for individuals with more than five years of experience
  2. 5. A trail of data intentionally left behind by a user
  3. 10. Store information across pages within the site
  4. 12. Crime that involves a computer and/or a network
  5. 13. Describes the digital environment in which computer networks communicate
  6. 16. Software that automatically displays or downloads advertising material
  7. 18. A type of malicious software
  8. 20. Links two or more devices
  9. 21. Someone who uses the internet to cause harm to a victim
  10. 22. Online harassment that uses electronic communication
  11. 23. Web browser feature
Down
  1. 1. Someone who uses a computer to gain access to systems or networks
  2. 3. Internet connection that encrypts traffic from a device to a private network
  3. 4. A standalone self-replicating software application that invades and destroys computers
  4. 6. Do not share ____________ across multiple sites
  5. 7. Software that allows an attacker to obtain information on another computer
  6. 8. Personally identifiable information
  7. 9. Malicious attempts by hackers to damage, steal, or destroy a computer
  8. 11. ___________ engineering is when an attacker manipulates someone into revealing information
  9. 14. Attacker sends fraudulent emails to deceive someone into revealing information
  10. 15. Software designed to disrupt, damage, or gain unauthorized access to a computer
  11. 17. Descriptive data that contains information about other data
  12. 19. In 1988, Robert __________ unleashed a malicious computer program