CIS 178 - Participation 3- Cybersecurity
Across
- 3. attacks seeking personal info
- 5. virtual shield for data
- 11. process of verifying user identity
- 12. everyday objects connected to internet/network
- 13. software that records keystrokes
- 15. lots of attackers preventing legitimate users
- 17. taking advantage of system flaw
- 18. vulnerable points attackers gain entrance
- 19. provides apps updated code
- 20. appears harmless but is malicious
Down
- 1. processing data for legal use
- 2. allows secure remote connection
- 4. decoding cypher to readable text
- 6. programs that lure/trap hackers
- 7. malware that makes you pay
- 8. trying high volume of passwords combos
- 9. commonly used for illegal internet activity
- 10. method that scrambles data
- 14. hacker gains access to data
- 16. malware collects private information