C for Cyber Security

1234567891011121314151617
Across
  1. 2. A form of malware used by hackers to spy on you and your computer activities
  2. 6. A flaw or weakness in a computer system that could be exploited to violate the system’s security
  3. 8. A malicious software designed to block access to a computer system until a sum of money is paid
  4. 10. The process of identifying a user’s identity
  5. 11. A method of connecting a series of computers and devices in a private encrypted network
  6. 13. Something personal to you and should never be shared
  7. 14. In addition to passwords; this ensures better security
  8. 15. Unauthorized access to a network, information systems or application
  9. 17. Threatening behavior facilitated through electronic means such as texting
Down
  1. 1. Alert / Always on the lookout
  2. 3. A fraudulent email purportedly from a reputable company attempting to get personal information
  3. 4. A piece of hardware or software, used to keep intruders out
  4. 5. When a hacker changes source of an email so that it seems to come from a trusted source
  5. 7. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
  6. 9. The process of taking plain text and scrambling it into an unreadable format
  7. 12. the address of a website; check its validity before clicking on it
  8. 13. A sequence of words or text used to control access to a computer; similar to a password
  9. 16. Facebook, Twitter, Instagram etc. (Two Words)