Cybersecurity
Across
- 1. Little card in your phone
- 7. Unwanted email messages
- 9. Being free from public attention
- 13. Stores information on your computer
- 14. Virus that spreads through network
- 16. Attack a nation’s computer networks
- 19. Intrudes on a device remotely
- 21. Wireless data network
Down
- 2. Malicious software
- 3. Prevents device from functioning correctly
- 4. Finger prints
- 5. Secret combination
- 6. Bypass security to gain access
- 8. From an outside/unknown source
- 10. Discarded digital devices
- 11. Malicious software
- 12. Scrambling information
- 15. Tracks all pressed keys
- 17. Copying files from a computer
- 18. Hides inside another program
- 20. Confirming the person is authentic