C for Cyber Security
Across
- 1. A form of malware used by hackers to spy on you and your computer activities
- 5. Unauthorized access to a network, information systems or application
- 6. A piece of software or application that displays advertisements on your computer
- 8. When a hacker changes source of an email so that it seems to come from a trusted source
- 9. A sequence of words or text used to control access to a computer; similar to a password
- 11. The process of taking plain text and scrambling it into an unreadable format
- 13. A piece of hardware or software, used to keep intruders out
- 15. Threatening behavior facilitated through electronic means such as texting
- 16. In addition to passwords; provides better security
- 18. A flaw or weakness in a computer system that could be exploited to violate the system’s security
Down
- 2. Something personal to you and should never be shared
- 3. A malicious software designed to block access to a computer system until a sum of money is paid
- 4. media Facebook, Twitter, Instagram etc. (Two Words)
- 6. The process of identifying a user’s identity
- 7. A combination of the words “robot” and “network”
- 10. the address of a website; check its validity before clicking on it
- 12. A fraudulent email purportedly from a reputable company attempting to get personal information
- 14. Alert / Always on the lookout
- 16. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
- 17. An icon displayed along a web browser URL - indicates a secure mode