CIS Module 9 Participation: Erin B.

123456789101112131415161718192021
Across
  1. 3. attacks nationwide networks
  2. 6. string of upper and lowercase letters/numbers
  3. 8. malicious computer code
  4. 9. motivated by principles or beliefs
  5. 10. use of technology to stalk someone
  6. 13. unlocks encrypted information
  7. 16. a false warning
  8. 17. specifies design and arrangement
  9. 20. harmful computer code
  10. 21. hides inside another program
Down
  1. 1. bullying that takes place with a device/online
  2. 2. stores information on your computer
  3. 4. security threat from own employees
  4. 5. waste from discarded digital services
  5. 7. ensures no imposters
  6. 11. prevents device function until paid
  7. 12. wireless data technology
  8. 14. free from public attention
  9. 15. email with false claims
  10. 18. malicious software
  11. 19. unwanted email