CIS 120 Cybersecurity

1234567891011121314151617181920
Across
  1. 4. strength in the security structure
  2. 8. off personal computer storage
  3. 10. thief through computerized means
  4. 11. needed for accessing secure information
  5. 13. unsolicited meat banter
  6. 15. casting cyber bait
  7. 17. blocks out unauthorized access
  8. 19. security tactics
  9. 20. address for accessing websites
Down
  1. 1. level for information security
  2. 2. used to harm your computer
  3. 3. software to monitor computerized information
  4. 5. a code for keeping secrets
  5. 6. weak point in security
  6. 7. ID with magnetic access chip
  7. 9. software used for destruction
  8. 12. data to identify a person
  9. 14. holds data hostage
  10. 16. lying about your location
  11. 18. the simplest part of security