Cyber Security

12345678910111213
Across
  1. 4. it with a flood of traffic from a team of computers.
  2. 5. often by using emails or fake websites that look like they are from trusted organizations.
  3. 7. until it is decrypted using a secret key.
  4. 10. The amount of data that can pass through a network or part of a network per second.
  5. 12. programs.
  6. 13. A distributed denial of service attack attempts to make an online service, like a website, unavailable by
Down
  1. 1. Software designed to block malware from entering protected networks.
  2. 2. Consists of code written in a programming language that instructs computers to perform specific tasks.
  3. 3. The process of using codes to make readable information unreadable. Encrypted information cannot be
  4. 6. Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
  5. 8. effort to draw attention to political or social issues.
  6. 9. Attempting to trick people into revealing sensitive information, such as passwords and credit card
  7. 11. Someone who uses computers and computer networks to disrupt services or share secret information in