Sarah cybersecurity passwords

123456789101112131415
Across
  1. 6. The collection of data stored online
  2. 7. spreads across devices while replicating within a network
  3. 9. Unwanted software that secretly installs and puts pop ups on your device
  4. 10. protects data from being changed or stolen
  5. 12. a backup of daily changes or new files
  6. 13. a code that is capable of corrupting the system or destroying data.
  7. 14. A malicious software that secretly infects devices to steal information
  8. 15. A complete copy of all data files
Down
  1. 1. keeps software and apps from being hacked into
  2. 2. plans how to restore data AFTER being attacked
  3. 3. The freedom from being observed or disturbed
  4. 4. Stores backup files at an alternative location
  5. 5. A download disguised as a program
  6. 8. protects how data is handled and shared
  7. 11. Protects computer networks from hackers and unauthorized access