Cybersecurity
Across
- 3. bullying another digitallly
- 4. hides in other programs
- 6. copying files to store
- 8. file that tracks your preferences
- 9. a strongly motivated attacker
- 11. spreads without user interaction
- 13. sequence of secure characters
- 14. falsely claiming legitimacy to hack
- 17. malicious software
- 18. unwanted email message
- 20. wireless data network
Down
- 1. scrambling security method
- 2. unlocking encrypted information
- 5. proving you are real
- 7. a threat from within
- 10. code that reproduces itself
- 12. discard from digital devices
- 15. a false warning
- 16. holds information until money is paid
- 19. sifting through data