Introduction to Cyber Security
Across
- 2. protects the wireless internet
- 4. signature sent with email to acknowledge that it was verified
- 6. security is broken and data was stolen
- 7. verifying a user's identity
- 9. a verification for servers to see what can send an email
- 11. foreign foreign software designed to harm a computer
- 12. protocol that protects internet communication
- 16. securing data from outside threats
- 18. programs used when running a PC
Down
- 1. latest version of security for wireless internet
- 2. allows your website to be published online
- 3. using radio waves to connect between nodes in a network
- 5. frauding as a trusted source to steal information
- 8. protection from cyber threats
- 10. making a copy of a data/file
- 13. disguising themself to steal information
- 14. malware to deny a user of their data
- 15. using means necessary to access someone else's device
- 16. communication through the use of electronic devices over networks
- 17. a protection against fake email addresses that are disguised to be real ones