Across
- 2. Malicious software spread over a network.
- 4. Someone who breaks into a device.
- 8. Illegally exploit vulnerable networks.
- 9. workers use their own devices.
- 10. A disguised type of malware.
- 11. Media manipulation to seem real.
- 13. a secure internet connection
- 15. Malware that collects/transmits private information.
- 16. viruses that try for money.
- 18. Systems that prevent unauthorized access.
- 19. cyber attacks using sensitive information.
- 20. Hyperlinks that seem real.
Down
- 1. a group of bad computers
- 3. software designed to damage computers.
- 5. Online harassment.
- 6. Manipulating a system.
- 7. Security measures using physiology and behavior.
- 12. Unwanted Ads on a device.
- 14. Scrambled data for authorized users.
- 17. Hidden malware when clicked on.
