cross

1234567891011121314151617
Across
  1. 1. central processing unit
  2. 3. theft - user manipulate online platforms to gain access or personal information to intimate a character
  3. 4. - an area in which a computer system and networks are used
  4. 7. a copy of the file/software
  5. 10. a text encryption
  6. 12. - software used as an intent to destroy, disrupt or gander unauthorized access to a computer.
  7. 14. - a malware used to deny organization access to a file system.
  8. 15. the application that provides service for the user and client
  9. 17. - a group of private computers used to infect malicious software.
Down
  1. 2. getting email or text identifying they have your password
  2. 4. process of safeguarding digital information through entire life cycle
  3. 5. the process or action verifying the identification
  4. 6. unwanted software used to deliver targeted advertisements
  5. 8. attack an attempt to gain unauthorized access to a computer
  6. 9. A part of a computer system to block unauthorized data
  7. 11. - bypassing an organization's existing security systems.
  8. 13. engineering - manipulation used to gain access to an unauthorized computer system.
  9. 16. protection from data theft