Cybersecurity Terminology Puzzle (participation 3)
Across
- 3. software that is harmful
- 4. software that checks for malware
- 6. internet access at starbucks
- 8. scrambling data in unreadable
- 10. attacks seeking out personal info
- 12. software that tracks you
- 13. shield for data
- 15. tech savy criminals stealing private information
- 17. improving security tools for cloud infrastructure
- 18. multiple attackers preventing legitimate users
Down
- 1. tricking users to click an image
- 2. altered image creating false reality
- 5. malware that makes you pay
- 7. malware pretending to be useful
- 9. designs, builds, and tests security systems
- 11. malware that displays adverts
- 14. network pro learning hacking techniques
- 16. online harassment that intimidates victims