Cybersecurity CIS178

1234567891011121314151617181920
Across
  1. 4. Portable chip storing cellular connection
  2. 5. Network Defense against unauthorized access
  3. 7. Deceptive scheme to trick victims
  4. 8. Fraudulent attempts to steal your data
  5. 10. File or document sent electronically
  6. 12. Cybercriminal skilled in breaching security
  7. 14. Online content displayed in a browser
  8. 15. Bad software directed at computers
  9. 17. Digital Crimes committed using technology
  10. 19. Developer updates to fix vulnerabilities
  11. 20. Essential access code for security
Down
  1. 1. Identifies you using something you are
  2. 2. Affects system displaying unwanted ads
  3. 3. Virus that disguises as legitimate software
  4. 6. Holds data hostage for money
  5. 9. Records users keystrokes to steal information
  6. 11. Physical object used for authentication
  7. 13. Detects and removes viruses
  8. 16. Unauthorized software that gathers information
  9. 18. Way to secure data trough coded algorithms