Cyber Security

12345678910
Across
  1. 3. process of going from cipher text to plain text
  2. 4. A type of attack where user sends a fraudulent message to trick a person
  3. 6. A network system that monitors and controls incoming and outgoing traffic
  4. 8. A tool to mask location by changing your ip address
  5. 9. A weakness in a program that can be exploited
  6. 10. A violation where sensitive data is compromised
Down
  1. 1. process of going from plain text to cipher text
  2. 2. Distributed denial of service. makes website unusable by flooding it
  3. 5. Technique used to manipulate people in order to receive sensitive information
  4. 7. malicious software that wreaks havoc on a computer