Cybersecurity - LMC Style

12345678910111213
Across
  1. 3. Malicious software
  2. 6. ___ Engineering. Hackers us this skill to trick people into revealing private information .
  3. 8. Software that collects data about a user and transmits it over the internet without the user’s knowledge/permission.
  4. 10. A technology used when working remote that secures information going to/from LMC’s servers.
  5. 11. Software Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
  6. 12. A technology that allows us to access our files through the internet from anywhere in the world. Hint: it also brings rain.
  7. 13. A group of computers, printers and devices that are interconnected.
Down
  1. 1. A system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds.
  2. 2. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. 4. A process of encoding messages to keep them secret, so only “authorized” parties can read it.
  4. 5. Who do you call for help?
  5. 7. A sequence of words (spaces and punctuation too) used for authentication.
  6. 9. Piece of code that replicates itself in order to spread the infection to other connected computers.