C for Cyber Security
Across
- 2. A form of malware used by hackers to spy on you and your computer activities
- 6. A flaw or weakness in a computer system that could be exploited to violate the system’s security
- 8. A malicious software designed to block access to a computer system until a sum of money is paid
- 10. The process of identifying a user’s identity
- 11. A method of connecting a series of computers and devices in a private encrypted network
- 13. Something personal to you and should never be shared
- 14. In addition to passwords; this ensures better security
- 15. Unauthorized access to a network, information systems or application
- 17. Threatening behavior facilitated through electronic means such as texting
Down
- 1. Alert / Always on the lookout
- 3. A fraudulent email purportedly from a reputable company attempting to get personal information
- 4. A piece of hardware or software, used to keep intruders out
- 5. When a hacker changes source of an email so that it seems to come from a trusted source
- 7. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
- 9. The process of taking plain text and scrambling it into an unreadable format
- 12. the address of a website; check its validity before clicking on it
- 13. A sequence of words or text used to control access to a computer; similar to a password
- 16. Facebook, Twitter, Instagram etc. (Two Words)