CIS 178 Participation Security Crossword Puzzle

1234567891011121314151617181920
Across
  1. 2. Applying updates to software to improve security
  2. 6. Designed to protect Computers and Networks
  3. 7. Where one would go to buy illegal things or stuff
  4. 8. Virus Detection Technology to protect Users
  5. 9. Security system that forms a virtual permiter around network
  6. 11. bypass to gain access to computer or network
  7. 12. Getting people to reveal Passwords
  8. 15. Taking advantage of flaws in network systems
  9. 17. Used by parents to restricts Kids access on the internet
  10. 18. Deliberate theft of sensitive data
  11. 19. Approved Applications within organizations
  12. 20. Malware disguised as an App or legit software
Down
  1. 1. Any type of intrusive computer software
  2. 3. A form of bullying in the online Realm
  3. 4. Analyzing data for legal evidence
  4. 5. Holds files Hostage for money
  5. 10. Secretly installed to gather sensitive data
  6. 12. Phishing Attack targeted to Individual
  7. 13. Authenticate with SMS text Or Email
  8. 14. Virtual secured Corridor
  9. 16. maintaining data confidentiality by use of secret code