Cyber Security Terms
Across
- 2. floods a server with traffic to prevent users from accessing internet services
- 4. requires additional information when a user is logging in
- 6. ensure that customers get to the real website when the URL is typed into the address bar
- 8. encrypts the connections between your device and internet
- 9. this should be complex, long, and unique
- 10. allows devices to communicate over the internet
- 13. gathers information about a person or thing without your permission
- 15. this may seem harmless at first but it can control your computer and data
- 18. information that is not written in plain text so that it cannot be read by other people
- 19. an email or text that may lead users to reveal sensitive information
- 20. this allows you to access you files through the internet at any time
Down
- 1. a type of malware that can spread from one computer to another by replicating itself
- 3. prevents you from accessing data on your device
- 5. a process that verifies a user or device before providing them with access
- 7. a malicious code that harms computers and systems
- 11. happens when someone tries to steal your information by appearing to be a trusted person or source
- 12. an email authentication tool that specifies servers that are allowed you to send emails to using your business domain name
- 14. a software that detects and removes security threats from a computer
- 16. records and monitors the keystrokes that an user created
- 17. controls network traffic and blocks unauthorized access