Cyber Security

1234567891011121314151617181920
Across
  1. 2. Malicious software spread over a network.
  2. 4. Someone who breaks into a device.
  3. 8. Illegally exploit vulnerable networks.
  4. 9. workers use their own devices.
  5. 10. A disguised type of malware.
  6. 11. Media manipulation to seem real.
  7. 13. a secure internet connection
  8. 15. Malware that collects/transmits private information.
  9. 16. viruses that try for money.
  10. 18. Systems that prevent unauthorized access.
  11. 19. cyber attacks using sensitive information.
  12. 20. Hyperlinks that seem real.
Down
  1. 1. a group of bad computers
  2. 3. software designed to damage computers.
  3. 5. Online harassment.
  4. 6. Manipulating a system.
  5. 7. Security measures using physiology and behavior.
  6. 12. Unwanted Ads on a device.
  7. 14. Scrambled data for authorized users.
  8. 17. Hidden malware when clicked on.