Cybersecurity
Across
- 3. steals information though a link
- 4. keeps intruders out
- 6. changes IP to look legitimate
- 8. helps provent cyber attacks
- 11. takes data for money
- 12. looks safe but isn’t
- 13. Malware that can reproduce itself
- 14. checks vulnerabilities in a system
- 16. manipulates human error
- 17. someone successfully got in
Down
- 1. identifying a user’s identity.
- 2. malicious software or infected data
- 5. a network of infected computers
- 6. malware used to spy
- 7. manipulating someone's mouse
- 9. A series 15 numbers
- 10. private encrypted network
- 15. protects information from hackers
- 17. locks up a website with requests