Security Terminology Puzzle (Participation 3)
Across
- 2. compromised computers used for cyberattacks
- 6. numbers identifying a internet connected device
- 9. personal devices in work space
- 10. network pro learning hacking techniques
- 11. tricking users to click an image
- 12. sensitive information thats unreadable
- 13. malware that makes you pay
- 14. software that is harmful
- 17. shield for data
- 18. software that checks for malware
- 19. A network that encrypts data
- 20. malware pretending to be useful
Down
- 1. cyber attacks accessing sensitive information
- 3. lots of attackers preventing legitimate users
- 4. attacks seeking out personal info
- 5. software that tracks you
- 7. malware that displays adverts
- 8. Training to prevent cyber threats
- 15. cybercriminals exploiting unauthorized access to computers
- 16. internet access at Starbucks