CIS178 Participation 3 Security Crossword -RC

1234567891011121314151617181920
Across
  1. 2. protect your information from hackers
  2. 4. on-demand services
  3. 5. Malware which changes, corrupts
  4. 10. thief to catch a thief
  5. 11. private encrypted network
  6. 12. identifying a user’s identity
  7. 14. An approach to security evaluation
  8. 16. allow hackers to remotely access
  9. 18. Faking origin Location
  10. 19. wide variety of bad software
Down
  1. 1. computers and associated peripherals
  2. 3. attempts to gain unauthorized access
  3. 6. applications that instruct a computer
  4. 7. fool the victim into giving
  5. 8. infected computer working together
  6. 9. attack on a computer system
  7. 13. virus detection technology
  8. 15. Using multiple hosts and users
  9. 17. innocent looking misleading computer program
  10. 20. Malware that can reproduce itself