Cybersecurity
Across
- 2. Irrelevant or inappropriate messages sent on the internet.
- 4. Designed to disrupt, damage, or gain access to a computer.
- 6. Data storage device that includes flash memory. (Contains 2 words for example: Deep fake becomes Deepfake).
- 8. Is a vulnerability in a system or device that has been disclosed but is not yet patched.
- 10. Sending emails to induce individuals to reveal personal information.
- 11. Process of encoding a message or information that only authorized parties can access. (Contains 2 words for example: USB Drive becomes USBDrive).
- 12. Allows users and websites operator to remain anonymous.
Down
- 1. Software designed to block access to a computer system until money is paid.
- 3. Access to a centralized resource or service.
- 5. Computer program that records every keystroke.
- 6. A standard cable connection interface for personal computers.
- 7. Web World wide web that is not discoverable. (Contains 2 words for example: USB Drive becomes USBDrive.
- 9. A video or sound recording that replaces someone's face or voice with someone else's, in a way that looks real.(Contains 2 words for example: USB Drive becomes USBDrive).