Basic Virtual Security
Across
- 3. an intermediary device that blocks unauthorized access to your network
- 6. when a third party alters the communication between two sides
- 8. form of attack that looks secure but is not
- 11. Encoding something so certain people may be able to view it
- 14. a copy of data stored away so it can be recovered if the original is damaged
- 15. program which will help protect your customer's privacy
- 17. a university connector
- 18. when scammers send out a message with a company's email address
- 20. Passcode to prove you are allowed access
Down
- 1. asks for payment in return for solving the problem
- 2. gaining sensitive information by looking over the target's shoulder
- 4. Volatile memory
- 5. attacking through a program or equipment thrown in the trash
- 7. a method of resolving a problem
- 9. Sign in once to get various service
- 10. This program allows your network to be private
- 12. an intermediary device that directs traffic
- 13. is a key used to pass
- 16. Frequent changes downloaded to keep your device secure from adaptive malware
- 19. surpasses 100% voltage for a brief moment