CyberSecurity Terms (Participation 3)

1234567891011121314151617181920
Across
  1. 2. Lots of attackers preventing users
  2. 6. Tricking users to click an image
  3. 7. Malware disguised as normal software
  4. 8. Public internet access
  5. 11. Malware that tracks you
  6. 13. Bring your own device
  7. 14. Attack seeking out personal info
  8. 16. Malware that makes you pay
  9. 17. Attack that exploits unknown vulnerability
  10. 18. Making data unreadable by scrambling
  11. 19. Shield for data
  12. 20. Network pro learning hacking techniques
Down
  1. 1. Malicious hackers
  2. 3. Security keeping internet users safe
  3. 4. Software that is harmful
  4. 5. Software that checks for malware
  5. 9. Malware that displays ads
  6. 10. Media altered realistically
  7. 12. Virtual private network
  8. 15. Unauthorized access to sensitive info