Cyber Security
Across
- 4. A cybercrime that uses the phone to steal confidential data.
- 7. When you swipe your access card, beware of persons nearby who may try __________.
- 8. protector This helps protect your screen from shoulder surfing.
- 9. Using an unprotected WiFi connection leaves your data vulnerable because it is not ____________.
Down
- 1. This network security device sits at the edge of your network and governs access.
- 2. This software is installed on your computer to protect it from viruses and malware.
- 3. A network of computers infected by malware and that are under the control of a single attacking party.
- 5. A person who uses computers to gain unauthorized access to data.
- 6. Computer software with malicious intent.