Cybersecurity
Across
- 4. A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
- 6. shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
- 9. a network security device that monitors traffic to or from your network.
- 10. Coding used to protect your information from hackers.
Down
- 1. A hacker who is invited to test out computer systems and servers, looking for vulnerabilities "hacker ____ __ "
- 2. The process of identifying a user’s identity
- 3. malicious attempt to disrupt normal traffic to a web property.
- 5. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
- 7. a method of connecting a series of computers and devices in a private encrypted network,
- 8. A piece of audio or video that has been altered and changed to make it seem authentic or credible.