CYBER

12345678910
Across
  1. 3. A secret word or phrase that is used to access a computer system or service.
  2. 5. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
  3. 7. The method of obtaining user information through fraudulent communications targeted directly at people.
  4. 9. The way in which the identity of a user is confirmed.
  5. 10. security A technique for protecting computers, networks, programs, and
Down
  1. 1. A technique for protecting computers, networks, programs, data from unauthorized access or hackers for exploitation.
  2. 2. Software that automatically displays or downloads material when a user is offline.
  3. 4. are typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, it can piggyback onto programs to corrupt data or expand throughout a network and damage systems across a company.
  4. 6. Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice.
  5. 8. A cyber attacker who uses software and social engineering methods to steal data and information. data from unauthorized access or hackers for exploitation.