Cybersecurity Key Terms
Across
- 2. Network of compromised computers.
- 3. Tracks users with hidden elements.
- 5. Unique numbers that identify device.
- 9. Protects data during encryption process.
- 13. Scrambling data to limit access.
- 14. Software that damages or disrupts.
- 18. Using technology to harass others.
- 19. Email scams targeting sensitive information.
- 20. Confirms identity before making changes.
Down
- 1. Detects, prevents, and removes malware.
- 4. Creating false realities using media.
- 6. Commonly available unsecured networks.
- 7. Blocks traffic and data flow.
- 8. Utilizing personal devices for work.
- 10. Helps create and store passwords.
- 11. Business strategy to improve cybersecurity.
- 12. Collects and shares sensitive information.
- 15. Malware that appears harmless.
- 16. Allows remote connection to networks.
- 17. Unauthorized users gain data access.