Cyber Security

1234567891011121314151617181920
Across
  1. 5. Middle man wifi network attack.
  2. 8. Hacker hired to test security.
  3. 9. Scrambling data to prevent theft.
  4. 12. Malicious elements that trick users.
  5. 15. Website temporarily shutting down.
  6. 17. Malicious commands.
  7. 18. Network of infected computers.
  8. 20. Malware that 'spies' on users.
Down
  1. 1. Software designed to hurt computer systems.
  2. 2. Verifies your identity.
  3. 3. Online harassment.
  4. 4. Cyber attack that includes fake sensitive info.
  5. 6. Protects a device from attack.
  6. 7. AI images showing Trump's Arrest.
  7. 10. Used during the encryption process.
  8. 11. Private network that uses encryption.
  9. 13. Unique device network identifier.
  10. 14. Demands ransom to regain access to computers.
  11. 16. Hacker changes IP address of email.
  12. 19. Higher risk of business security breach.