Cyber Security Awareness
Across
- 2. Ethical hacker.
- 3. Network of compromised devices
- 6. Software to detect and remove threats.
- 9. Redirecting website traffic
- 10. Software that tracks user behavior.
- 12. Digital crime investigation.
- 14. Self-replicating malicious software.
- 15. Software that records keystrokes
- 16. Security barrier for online threats.
- 18. Deceptive emails to steal information.
- 20. Hostile takeover of online activity.
Down
- 1. Proving your identity online.
- 4. Holding data hostage for money.
- 5. Unauthorized data access.
- 7. Unauthorized entry into a system.
- 8. Security event or occurrence.
- 11. Weakness that can be exploited.
- 13. Faking an identity online.
- 17. Method to make data unreadable without a key.
- 19. Harmful software.