National Cybersecurity Month

1234567891011
Across
  1. 5. SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING
  2. 6. A SCAM BY WHICH AN EMAIL USER IS DUPED INTO REVEALING PERSONAL OR CONFIDENTIAL INFORMATION WHICH THE SCAMMER CAN USE ILLICITLY
  3. 7. AN INTEGRATED COLLECTION OF SECURITY MEASURES DESIGNED TO PREVENT UNAUTHORIZED ELECTRONIC ACCESS TO A NETWORKED COMPUTER
  4. 9. A COMPUTER THAT IS UNDER COTNROL OF A MALICIOUS HACKER WITHOUT THE KNOWLEDGE OF THE COMPUTER OWNER
  5. 10. A PROGRAM THAT IS DESIGNED TO HARM A COMPUTER BY DELETING DATA, RUINING FILES, & THAT CAN BE SPREAD SECRETLY FROM ONE COMPUTER TO ANOTHER
Down
  1. 1. COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER
  2. 2. THE ACT OF OBTAINING OR ATTEMPTING TO OBTAIN OTHERWISE SECURE DATA BY CONNING AN INDIVIDUAL INTO REVEALING SECURE INFORMATION
  3. 3. MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK
  4. 4. A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM
  5. 8. USUALLY A SMALL SELF-CONTAINED & SELF REPLICATING COMPUTER PROGRAM THAT INVADES COMPUTERS ON A NETWORK AND USUALLY PERFORMS A DESTRUCTIVE ACTION
  6. 11. EMAIL THAT IS NOT WANTED, EMAIL THAT IS SENT TO LARGE NUMBERS OF PEOPLE AND CONSISTS OF MOSTLY ADVERTISING