Cyber Security Terms

1234567891011121314151617181920
Across
  1. 2. floods a server with traffic to prevent users from accessing internet services
  2. 4. requires additional information when a user is logging in
  3. 6. ensure that customers get to the real website when the URL is typed into the address bar
  4. 8. encrypts the connections between your device and internet
  5. 9. this should be complex, long, and unique
  6. 10. allows devices to communicate over the internet
  7. 13. gathers information about a person or thing without your permission
  8. 15. this may seem harmless at first but it can control your computer and data
  9. 18. information that is not written in plain text so that it cannot be read by other people
  10. 19. an email or text that may lead users to reveal sensitive information
  11. 20. this allows you to access you files through the internet at any time
Down
  1. 1. a type of malware that can spread from one computer to another by replicating itself
  2. 3. prevents you from accessing data on your device
  3. 5. a process that verifies a user or device before providing them with access
  4. 7. a malicious code that harms computers and systems
  5. 11. happens when someone tries to steal your information by appearing to be a trusted person or source
  6. 12. an email authentication tool that specifies servers that are allowed you to send emails to using your business domain name
  7. 14. a software that detects and removes security threats from a computer
  8. 16. records and monitors the keystrokes that an user created
  9. 17. controls network traffic and blocks unauthorized access