Cybersecurity
Across
- 2. fake email that fools users
- 5. online harassment
- 7. small files stored on PC
- 8. tricking victims into buying online
- 9. bring your own device
- 10. junk mail
- 12. replicating computer program malware
- 13. virtual private network
- 17. prevents unauthorized access
- 18. fraudulent business practices
- 19. following employee into restricted are
- 20. malware that collects and transmits
Down
- 1. wireless technology
- 3. unauthorized intrusion
- 4. codes that protect data
- 6. bypassing security (hidden method)
- 11. name used identify someone online
- 14. harmful software
- 15. malicious "horse" software
- 16. telephone scam