Cybersecurity Participation Activity

12345678910111213141516171819
Across
  1. 2. Designed to prevent unauthorized computer access
  2. 5. Virus that spreads through a network
  3. 6. ______ engineering (gaining trust)
  4. 7. They break into a computer system
  5. 9. Phishing using voicemail
  6. 10. Username and password
  7. 13. Scam that clones your phone
  8. 14. Manipulated image used for propaganda
  9. 15. Typically junk email
  10. 16. Their malintent is financial gain
  11. 17. Authentication that employs login barriers
  12. 19. Malicious software
Down
  1. 1. Webpages not indexed by search engine
  2. 3. Important password feature
  3. 4. Pretends to be legitimate; hides virus
  4. 6. Records credit card information
  5. 8. Professional hackers who help organizations
  6. 11. Unique combination of words
  7. 12. Technological use of biological characteristics
  8. 14. Acronym for flooding, shutting down website
  9. 18. Webpages used for illegal activity