CIS 120 Cybersecurity
Across
- 4. strength in the security structure
- 8. off personal computer storage
- 10. thief through computerized means
- 11. needed for accessing secure information
- 13. unsolicited meat banter
- 15. casting cyber bait
- 17. blocks out unauthorized access
- 19. security tactics
- 20. address for accessing websites
Down
- 1. level for information security
- 2. used to harm your computer
- 3. software to monitor computerized information
- 5. a code for keeping secrets
- 6. weak point in security
- 7. ID with magnetic access chip
- 9. software used for destruction
- 12. data to identify a person
- 14. holds data hostage
- 16. lying about your location
- 18. the simplest part of security