Across
- 2. A cyber attack that makes a computer and its resources unavailable.
- 4. Only authorized persons can modify the data and information on the computer.
- 6. A malicious piece of computer programs that pretends to be legitimate.
- 7. A device that connects your computer to the internet
- 8. A cyber attack where someone pretends to be someone else to steal information.
- 10. A device used to connect multiple computer network devices.
- 11. A device that connects different computer networks together
- 14. Persons can access the computer whenever they want and from any location.
Down
- 1. A malicious piece of computer software.
- 2. The transmission of data between computers
- 3. Only authorized persons have access to sensitive data and information.
- 5. A Company that provides internet.
- 9. A type of virus that spreads through email.
- 12. A device that boost a wireless signal.
- 13. A malicious piece of software that steals information with your knowledge.
