CIS 178 Participation Cybersecurity Joseph Certuche
Across
- 2. short for malicious
- 3. act of listening in
- 6. duplicate copy of data
- 7. to describe any fraudulent business
- 9. screen out hackers, viruses, and worms
- 10. humans can get it too.
- 11. monitors a victim's online activity
- 14. to ensure and confirm identity
- 17. decoy system to attract attackers
- 18. overlay on a legitimate page
- 20. software program that montitors computer
- 21. capture keystrokes
Down
- 1. high-profile business attack
- 4. Generates revenue for its developer
- 5. face swapped or digitally altered
- 8. online advertising to deliver malware
- 12. technique for acquiring sensitive data
- 13. error, fault or flaw
- 15. type of malicious software
- 16. flaw in the system
- 19. encyption technology