Cyber Security
Across
- 6. Internet protocol
- 7. Physical Components of a pc
- 9. collective network of devices
- 10. only numbers combined t
- 11. social engineering attack involving email
- 14. picture puzzles are common security
- 15. several security methods is called
- 16. Distributed Denial of service
- 17. Controls and monitors traffic
- 18. malware, that replicates inside files
Down
- 1. process of proving you are
- 2. an intentional harmful file
- 3. global network of remote servers
- 4. pretends to be something else
- 5. in the middle attack
- 8. Process of protecting information
- 11. letters, numbers,special characters combined
- 12. group of interconnected computing devices
- 13. Programs, operating systems
- 18. virtual private network