Cybersecurity
Across
- 1. cable preventing theft of mobile devices
- 3. network virus
- 7. unwanted email messages
- 9. storing files from hard drive remotely
- 10. malicious code stored in files
- 12. tricking victim into giving information
- 16. bring your own device
- 17. verifying a user's identity
- 19. sending fake emails to scam
Down
- 2. UI redress attack
- 4. malicious software
- 5. attack that changes devices' address
- 6. malware requiring payment to fix
- 8. false warning from fake senders
- 10. masks user's location
- 11. network of hacker computers
- 13. website generated file storing info on your computer
- 14. scrambling information necessitating a passkey
- 15. instructions commanding browser actions
- 18. malware hidden within another program