C for Cyber Security

1234567891011121314151617181920
Across
  1. 2. A fraudulent email purportedly from a reputable company attempting to get personal information
  2. 6. Something personal to you and should never be shared
  3. 9. A malicious software designed to block access to a computer system until a sum of money is paid
  4. 11. The process of identifying a user’s identity
  5. 12. The process of taking plain text and scrambling it into an unreadable format
  6. 14. A combination of the words “robot” and “network”
  7. 15. A piece of software or application that displays advertisements on your computer
  8. 16. A piece of hardware or software, used to keep intruders out
  9. 17. An icon displayed along a web browser URL; indicates a secure mode
  10. 18. the address of a website; check its validity before clicking on it
  11. 19. Unauthorized access to a network, information systems or application
  12. 20. Alert / Always on the lookout
Down
  1. 1. A sequence of words or text used to control access to a computer; similar to a password
  2. 3. A form of malware used by hackers to spy on you and your computer activities
  3. 4. A flaw or weakness in a computer system that could be exploited to violate the system’s security
  4. 5. Threatening behavior facilitated through electronic means such as texting
  5. 7. In addition to passwords; provides better security
  6. 8. Facebook, Twitter, Instagram etc. (Two Words)
  7. 10. When a hacker changes source of an email so that it seems to come from a trusted source
  8. 13. harmful computer programs such as viruses, worms, and trojans used by hackers to harm your computer