Cybersecurity Terminology
Across
- 3. Fishing for the highest target
- 4. Network security that filters access
- 6. Your personal cybersecurity methods
- 9. Computer program to fight attacks
- 10. Your personal key
- 13. Is it really you?
- 14. Flooding your servers
- 16. A virus is watching you
- 17. Make sure you block these
- 19. Who and what is allowed
Down
- 1. Malicious program
- 2. Gaining access without approval
- 5. Information accessed through a key
- 7. I'm not where I say I am
- 8. A computer infection
- 11. I don't want these emails
- 12. Holding your information captive
- 15. Your internet address
- 17. Casting a line for personal information
- 18. Software update to fix holes