CHPW Cybersecurity
Across
- 5. caused by programming weaknesses in software
- 6. CHPW's secure email gateway
- 8. software that redirects your browse, or monitor the websites you visit
Down
- 1. software that captures your keystrokes
- 2. people who seek to exploit weaknesses in software and computer systems
- 3. when to report if your computer or mobile device becomes lost or stolen
- 4. code that exploits programming weaknesses of software
- 7. type of malicious code