CIS 120 Rabago Module 9

1234567891011121314151617181920
Across
  1. 2. Encrypts data on internet
  2. 9. Recording key strokes
  3. 10. Software that hides itself
  4. 11. Convert data into code
  5. 13. Locked until paid
  6. 17. Monitor and control traffic
  7. 18. From inside the organization
  8. 19. Investigating cyber crimes
  9. 20. Trying everything
Down
  1. 1. Secretly monitoring
  2. 3. Limit who can access network
  3. 4. Malicious software
  4. 5. Understand and prevent threats
  5. 6. remotely compromised computers
  6. 7. Social engineering attack
  7. 8. Manipulating people into giving info
  8. 12. Overwhelming a system
  9. 14. Ways to verify identity
  10. 15. Unknown to vendor
  11. 16. Updating Software