Cyber Security

123456789
Across
  1. 4. A cybercrime that uses the phone to steal confidential data.
  2. 7. When you swipe your access card, beware of persons nearby who may try __________.
  3. 8. protector This helps protect your screen from shoulder surfing.
  4. 9. Using an unprotected WiFi connection leaves your data vulnerable because it is not ____________.
Down
  1. 1. This network security device sits at the edge of your network and governs access.
  2. 2. This software is installed on your computer to protect it from viruses and malware.
  3. 3. A network of computers infected by malware and that are under the control of a single attacking party.
  4. 5. A person who uses computers to gain unauthorized access to data.
  5. 6. Computer software with malicious intent.