Cyber security

123456789101112131415
Across
  1. 3. Hardware or software designed to prevent unauthorized access to or from a private network
  2. 6. A type of malicious software designed to block access to a computer system until a sum of money is paid
  3. 8. When someone sends an email with a link to a bogus website, it is called.....
  4. 9. Software ..... is the theft of software through illegal copying of genuine programs or through counterfeiting and distribution of imitation of software products or unauthorized versions of software products
  5. 12. Software programs that protect your computer from internet virus and malicious code
  6. 14. Threating behavior facilitated through electrical means such as texting
  7. 15. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information
Down
  1. 1. ..... force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
  2. 2. Malicious program that uses a computer network to replicate
  3. 4. Fraudulent phone calls
  4. 5. Harmful computer programs such as viruses, worms and trojans used by hackers to gain access to your computer and cause destruction
  5. 7. You should not just check identity, you should also confirm.....
  6. 10. The process of taking plain text and scrambling it into an unreadable format
  7. 11. Malicious computer code that reproduce itself
  8. 13. This can slow down your computer and watch everywhere you go