Cyber Security
Across
- 2. Blocks unauthorized network access
- 5. Misleading link for attention
- 6. To fix security vulnerabilities
- 11. Encrypts internet traffic securely
- 13. Fraudulent emails stealing data
- 14. Clickable web address
- 15. Copies data for recovery
- 16. Identifies a system user
- 17. Harmful software, includes viruses
- 19. Stores website user data
Down
- 1. Wireless internet connection
- 3. Converts data into unreadable code
- 4. Test to block bots
- 7. Gains unauthorized system access
- 8. Secretly collects user information
- 9. Used to secure accounts
- 10. Exits an account safely
- 12. Unwanted email messages
- 18. Detects and removes malware