CIS 178 - Participation 3- Cybersecurity

1234567891011121314151617181920
Across
  1. 3. attacks seeking personal info
  2. 5. virtual shield for data
  3. 11. process of verifying user identity
  4. 12. everyday objects connected to internet/network
  5. 13. software that records keystrokes
  6. 15. lots of attackers preventing legitimate users
  7. 17. taking advantage of system flaw
  8. 18. vulnerable points attackers gain entrance
  9. 19. provides apps updated code
  10. 20. appears harmless but is malicious
Down
  1. 1. processing data for legal use
  2. 2. allows secure remote connection
  3. 4. decoding cypher to readable text
  4. 6. programs that lure/trap hackers
  5. 7. malware that makes you pay
  6. 8. trying high volume of passwords combos
  7. 9. commonly used for illegal internet activity
  8. 10. method that scrambles data
  9. 14. hacker gains access to data
  10. 16. malware collects private information