CIS 178 Participation Cybersecurity Joseph Certuche

123456789101112131415161718192021
Across
  1. 2. short for malicious
  2. 3. act of listening in
  3. 6. duplicate copy of data
  4. 7. to describe any fraudulent business
  5. 9. screen out hackers, viruses, and worms
  6. 10. humans can get it too.
  7. 11. monitors a victim's online activity
  8. 14. to ensure and confirm identity
  9. 17. decoy system to attract attackers
  10. 18. overlay on a legitimate page
  11. 20. software program that montitors computer
  12. 21. capture keystrokes
Down
  1. 1. high-profile business attack
  2. 4. Generates revenue for its developer
  3. 5. face swapped or digitally altered
  4. 8. online advertising to deliver malware
  5. 12. technique for acquiring sensitive data
  6. 13. error, fault or flaw
  7. 15. type of malicious software
  8. 16. flaw in the system
  9. 19. encyption technology