CIS 178 Cybersecurity Participation
Across
- 3. Malware that demands payment
- 8. Software that detects malware
- 9. Criminal activity on computer systems
- 11. secure website connection
- 12. Successful cyber attack
- 13. a software vulnerability
- 17. a system weakness
- 18. malicious digital activity
- 19. data protection method
- 20. fraudulent email technique
Down
- 1. network security barrier
- 2. a traffic overload cyberattack
- 4. user identity verification
- 5. computer infection
- 6. secret access code
- 7. unauthorized access
- 10. harmful software program
- 14. unsolicited email
- 15. A network of infected computers
- 16. physical trait recognition