Across
- 1. central processing unit
- 3. theft - user manipulate online platforms to gain access or personal information to intimate a character
- 4. - an area in which a computer system and networks are used
- 7. a copy of the file/software
- 10. a text encryption
- 12. - software used as an intent to destroy, disrupt or gander unauthorized access to a computer.
- 14. - a malware used to deny organization access to a file system.
- 15. the application that provides service for the user and client
- 17. - a group of private computers used to infect malicious software.
Down
- 2. getting email or text identifying they have your password
- 4. process of safeguarding digital information through entire life cycle
- 5. the process or action verifying the identification
- 6. unwanted software used to deliver targeted advertisements
- 8. attack an attempt to gain unauthorized access to a computer
- 9. A part of a computer system to block unauthorized data
- 11. - bypassing an organization's existing security systems.
- 13. engineering - manipulation used to gain access to an unauthorized computer system.
- 16. protection from data theft
