Cyber Security
Across
- 4. Software that displays unwanted ads.
- 5. A fix for software vulnerability.
- 6. Overwhelms a server with traffic.
- 8. Unsolicited junk email messages.
- 10. Website data stored on browser.
- 12. Decoy system to trap attackers.
- 14. Disguised malicious software program.
- 16. General term for bad software.
- 17. Algorithm for encrypting information.
- 18. Secretly monitors your activity.
- 19. Gains unauthorized computer access.
- 20. Creates a private, secure connection.
Down
- 1. Self-replicating malicious computer code.
- 2. Network traffic security guard.
- 3. Your secret key for access.
- 7. Scrambles data for your privacy.
- 9. Deceptive emails steal your info.
- 11. Records all of your keystrokes.
- 13. Unauthorized access to data.
- 15. Holds your personal files hostage.