Cybersecurity Participation Activity
Across
- 2. Designed to prevent unauthorized computer access
- 5. Virus that spreads through a network
- 6. ______ engineering (gaining trust)
- 7. They break into a computer system
- 9. Phishing using voicemail
- 10. Username and password
- 13. Scam that clones your phone
- 14. Manipulated image used for propaganda
- 15. Typically junk email
- 16. Their malintent is financial gain
- 17. Authentication that employs login barriers
- 19. Malicious software
Down
- 1. Webpages not indexed by search engine
- 3. Important password feature
- 4. Pretends to be legitimate; hides virus
- 6. Records credit card information
- 8. Professional hackers who help organizations
- 11. Unique combination of words
- 12. Technological use of biological characteristics
- 14. Acronym for flooding, shutting down website
- 18. Webpages used for illegal activity