Cyber Awareness
Across
- 2. programs like worms, trojans, and viruses hackers use to gain access and cause destruction
- 5. protection from unauthorized changes
- 7. this ensures authorized users have access
- 10. process of scrambling plain text into an unreadable format
- 11. email allegedly coming from a company or person you know trying to get personal information
- 12. verify identity
Down
- 1. flaw or weakness in a computer system that could be exploited
- 3. type of malicious software that blocks access until money is paid
- 4. the address of a webpage that you should verify before clicking
- 6. a wireless technology standard used over short distances
- 8. unauthorized access to a network, information systems, or application
- 9. should include lower and upper case letters, numbers, and special characters