Cybersecurity

1234567891011121314151617
Across
  1. 2. Pretends to be a normal application
  2. 3. Software infected into a device
  3. 5. Forces users to pay a fee
  4. 7. network security
  5. 8. Attack Computers
  6. 11. Nationwide threat
  7. 12. captures keystrokes without user knowledge
  8. 13. process proving you are the real user
  9. 15. Promotes agendas through cyberattacks
  10. 17. pretends to be a company
Down
  1. 1. combats malware attacks
  2. 4. Pop-ups
  3. 6. a flaw in the system
  4. 8. used to protect devices
  5. 9. Looks for Vulnerabilities
  6. 10. face or fingerprint scan
  7. 11. Bullying
  8. 14. usually happens after a bug is found in the software
  9. 16. copies itself into programs
  10. 17. The key to a digital lock