Cybersecurity

123456789101112
Across
  1. 1. influencing or deceiving a victim in order to gain control
  2. 5. self replicate other computers
  3. 6. thieves attempt to steal personal info
  4. 9. looking at information over a shoulder
  5. 11. use of own knowledge to secure organzinations
  6. 12. steals anything they want
Down
  1. 2. processing data by the computer
  2. 3. non-threatening traffic in to keep dangerous stuff out
  3. 4. inventing a specific scenario
  4. 7. unintentional actions
  5. 8. robot network
  6. 10. form that is efficient for movement or processing