CIS 178 Participation 3 Security

1234567891011121314151617181920
Across
  1. 2. computers or devices infected with malicious software
  2. 5. collects and transmits sensitive information
  3. 6. form of bullying that occurs online
  4. 9. spreads from one computer to another
  5. 10. virtual private network, secure online service
  6. 12. "advertising-supported software" designed to display unwanted advertisements
  7. 14. malicious software
  8. 15. intrudes on a device remotely
  9. 17. protecting digital assets
  10. 19. development/use of computer systems/networks to store information.
  11. 20. tricks users into clicking a disguised link
Down
  1. 1. application designed to monitor network traffic
  2. 3. disguises itself as a legitimate program or software
  3. 4. uses bait to lure unsuspecting victims
  4. 7. uses fingerprints, facial recognition, etc. to log into a device
  5. 8. encrypts user's files or locks computer until a ransom is paid
  6. 11. media manipulation, alter images/video for fake perception
  7. 13. actions aimed to infiltrate computer networks.
  8. 16. method of scrambling data for authorized users
  9. 18. fake, disguised, bogus