Cybersecurity
Across
- 2. Shield users against viruses.
- 4. A series of numbers located on routers.
- 9. Protecting sensitive business information.
- 12. The opposite of a solution.
- 13. Should be kept hidden.
- 14. Two or more computers connected together.
- 15. Hacker successfully breaking into a system.
- 16. Laptop, Phone, etc.
Down
- 1. Attack on the Wifi system.
- 3. Used to keep intruders out.
- 5. Coding used to protect your information from hackers.
- 6. Apps.
- 7. Attackers scamming victims.
- 8. Malware which changes, corrupts, or destroys information.
- 10. Connected to on devices.
- 11. A group of applications.