Cybersecurity
Across
- 2. stalking through web technology
- 5. Process of confirming someone's identity
- 6. Protection against potential harm
- 11. Malware that can collect/transmit user data without the user's knowledge
- 14. Malware designed to restrict access
- 15. Illegal activity done on the internet
- 17. Unlocking encrypted information
- 20. free from public attention
- 21. False claims to get private information
Down
- 1. Network security monitors/controls incoming and outgoing traffic
- 3. Security threat from within company
- 4. hacker who is highly motivated by principles
- 7. Information converted into secret form
- 8. Someone who tries to gain access without authorization
- 9. Software that delivers ads on your system
- 10. Unwanted emails from unknown senders
- 12. Bullying on the internet
- 13. Gaining access an undocumented way
- 16. Malicious software designed to infect
- 18. File from website that stores your info
- 19. collection of malware that spreads through computer