BStevenson CIS 178 Participation Week 3

1234567891011121314151617181920
Across
  1. 2. tricking users into clicking links
  2. 5. access code for unscrambling data
  3. 7. internet accessible to anyone
  4. 11. Harassment occurs online.
  5. 13. malware pretending to be useful
  6. 14. attacks seeking personal information.
  7. 15. tracking software
  8. 17. malware that shows advertisements
  9. 18. manipulated media for false perceptions.
  10. 19. unauthorized users access sensitive information
  11. 20. harmful software
Down
  1. 1. criminal using hacking for bad
  2. 3. software that checks for malware
  3. 4. malware that makes you pay
  4. 6. scrambling data to keep protected.
  5. 8. professional using hacking for good
  6. 9. bringing personal device to work.
  7. 10. many bots preventing legitimate users.
  8. 12. a unique string of numbers
  9. 16. data shield