Wes Rich - CIS178 Week 3 Participation Cyber-Security Terms

1234567891011121314151617181920
Across
  1. 2. Protection against malicious programs.
  2. 3. Malicious cyber attackers.
  3. 4. Data protection through cryptography.
  4. 9. Deceptive malicious software.
  5. 10. Network of compromised computers.
  6. 14. Deceptive online identity theft.
  7. 16. Covert information-gathering software.
  8. 18. Ethical cybersecurity professionals.
  9. 19. Attack Network flooding disruption technique.
  10. 20. Synthetic media manipulation technique.
Down
  1. 1. Security breach exposes data.
  2. 5. Tools Software for secure password storage.
  3. 6. Secret codes for data protection.
  4. 7. Harmful computer software.
  5. 8. Unpatched software vulnerability exploitation.
  6. 11. Network traffic filtering safeguard.
  7. 12. Deceptive click manipulation technique.
  8. 13. Online harassment and intimidation.
  9. 15. Secure remote network access.
  10. 17. Files held hostage for payment.