Basic Virtual Security

1234567891011121314151617181920
Across
  1. 3. an intermediary device that blocks unauthorized access to your network
  2. 6. when a third party alters the communication between two sides
  3. 8. form of attack that looks secure but is not
  4. 11. Encoding something so certain people may be able to view it
  5. 14. a copy of data stored away so it can be recovered if the original is damaged
  6. 15. program which will help protect your customer's privacy
  7. 17. a university connector
  8. 18. when scammers send out a message with a company's email address
  9. 20. Passcode to prove you are allowed access
Down
  1. 1. asks for payment in return for solving the problem
  2. 2. gaining sensitive information by looking over the target's shoulder
  3. 4. Volatile memory
  4. 5. attacking through a program or equipment thrown in the trash
  5. 7. a method of resolving a problem
  6. 9. Sign in once to get various service
  7. 10. This program allows your network to be private
  8. 12. an intermediary device that directs traffic
  9. 13. is a key used to pass
  10. 16. Frequent changes downloaded to keep your device secure from adaptive malware
  11. 19. surpasses 100% voltage for a brief moment