C for Cyber Security

123456789101112131415161718
Across
  1. 1. A form of malware used by hackers to spy on you and your computer activities
  2. 5. Unauthorized access to a network, information systems or application
  3. 6. A piece of software or application that displays advertisements on your computer
  4. 8. When a hacker changes source of an email so that it seems to come from a trusted source
  5. 9. A sequence of words or text used to control access to a computer; similar to a password
  6. 11. The process of taking plain text and scrambling it into an unreadable format
  7. 13. A piece of hardware or software, used to keep intruders out
  8. 15. Threatening behavior facilitated through electronic means such as texting
  9. 16. In addition to passwords; provides better security
  10. 18. A flaw or weakness in a computer system that could be exploited to violate the system’s security
Down
  1. 2. Something personal to you and should never be shared
  2. 3. A malicious software designed to block access to a computer system until a sum of money is paid
  3. 4. media Facebook, Twitter, Instagram etc. (Two Words)
  4. 6. The process of identifying a user’s identity
  5. 7. A combination of the words “robot” and “network”
  6. 10. the address of a website; check its validity before clicking on it
  7. 12. A fraudulent email purportedly from a reputable company attempting to get personal information
  8. 14. Alert / Always on the lookout
  9. 16. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer
  10. 17. An icon displayed along a web browser URL - indicates a secure mode