Cybersecurity
Across
- 3. Implanted malware with a fee.
- 4. Linked computers with a virus.
- 6. Copy of computer's hard drive.
- 8. Program that stores passwords.
- 9. Emails sent by unknown sender.
- 10. Take someone's identity for fraud.
- 12. Upper/lowercase letters, numbers, symbols
- 14. Hardware tracking keystrokes.
- 15. Multiple computers that are connected.
- 16. Protective barrier.
- 19. Identity verification of physical appearance.
- 21. Private network.
Down
- 1. Scrambled data unlocked with key.
- 2. Software used to infect computers.
- 5. Code sent to phone.
- 7. Software attacks unshielded computer components.
- 9. Malware hackers operate.
- 11. Not easily accessible without URL.
- 13. Website stored preferences.
- 17. Computer address changed.
- 18. Hacker posing as someone else.(Email)
- 20. Malware disguised as another program.