Cyber Awareness

123456789101112
Across
  1. 2. programs like worms, trojans, and viruses hackers use to gain access and cause destruction
  2. 5. protection from unauthorized changes
  3. 7. this ensures authorized users have access
  4. 10. process of scrambling plain text into an unreadable format
  5. 11. email allegedly coming from a company or person you know trying to get personal information
  6. 12. verify identity
Down
  1. 1. flaw or weakness in a computer system that could be exploited
  2. 3. type of malicious software that blocks access until money is paid
  3. 4. the address of a webpage that you should verify before clicking
  4. 6. a wireless technology standard used over short distances
  5. 8. unauthorized access to a network, information systems, or application
  6. 9. should include lower and upper case letters, numbers, and special characters