Across
- 2. Applying updates to software to improve security
- 6. Designed to protect Computers and Networks
- 7. Where one would go to buy illegal things or stuff
- 8. Virus Detection Technology to protect Users
- 9. Security system that forms a virtual permiter around network
- 11. bypass to gain access to computer or network
- 12. Getting people to reveal Passwords
- 15. Taking advantage of flaws in network systems
- 17. Used by parents to restricts Kids access on the internet
- 18. Deliberate theft of sensitive data
- 19. Approved Applications within organizations
- 20. Malware disguised as an App or legit software
Down
- 1. Any type of intrusive computer software
- 3. A form of bullying in the online Realm
- 4. Analyzing data for legal evidence
- 5. Holds files Hostage for money
- 10. Secretly installed to gather sensitive data
- 12. Phishing Attack targeted to Individual
- 13. Authenticate with SMS text Or Email
- 14. Virtual secured Corridor
- 16. maintaining data confidentiality by use of secret code
