Cyber Security

123456789101112
Across
  1. 4. ethics being authorized to attempt to gain unauthorized access to a computer,
  2. 6. scramble,
  3. 7. the practice of encoding information so only authorized people can read it,
  4. 9. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit care numbers,
  5. 10. the practice of protecting systems networks, and programs from digital attacks,
  6. 11. footprint a data trail you unintentionally leave online,
  7. 12. hat hackers have permission to hack a system to discover the systems vulnerabilities,
Down
  1. 1. the practice of solving and writing encryptions,
  2. 2. a type of malicious software designed to block access to a computer system until a sum of money is paid,
  3. 3. hacking to promote a political agenda or social change,
  4. 5. a form of protection for intellectual property usually applying to artistic works,
  5. 7. the use of electronic communication to bully a person,
  6. 8. literacy having the ability to find information evaluate information credibility and use information effectively,