CIS178 Participation 3 Security Crossword

1234567891011121314151617181920
Across
  1. 3. Authentication using physical characteristics
  2. 9. Transmits information about users activity
  3. 12. Something hackers can't exploit
  4. 14. An advanced fee fraud
  5. 15. Users online activity left behind
  6. 18. Shared computer and storage resources
  7. 19. Call to commit identity theft
  8. 20. Designed to detect hacking
Down
  1. 1. Designed to protect personal data
  2. 2. A network of infected devices
  3. 4. Disguised as legitimate software
  4. 5. Gathers information about browsing history
  5. 6. Malicious attempts to damage
  6. 7. Program that can automate tasks
  7. 8. Software designed to detect viruses
  8. 10. Applying updates to firmware
  9. 11. Software that installs itself secretly
  10. 13. High targeted phishing attacks
  11. 16. Prevents unauthorized access to network
  12. 17. Mass emails sent to people