Cyber Security

123456789101112131415
Across
  1. 2. a quick access website based directory
  2. 7. Entering into someone or something else’s data stream either by means of hacking or password changing.
  3. 9. Being in favor of, or creating aspects towards a decision that will skew an argument at the expense of reputation.
  4. 11. Company, known as a open network browser
  5. 13. the world wide web is also known as
  6. 14. The remnant that is left after browsing. Could be seen by researching through search history and clicking confirmation tickets.
Down
  1. 1. Known as an asset in the stock market, these are an investment type
  2. 3. False hyperlinks made in order to create data infiltration, used as a tactic, primary objective of account takeover.
  3. 4. Trademarking an intellectual property in order to avoid copying an idea, commonly used in business material.
  4. 5. an accessible tech support
  5. 6. Protective strategy tailored towards the internet, an ever evolving shield against data infiltration.
  6. 8. Company, known for computer backup and storage networking
  7. 10. The street credit as well as infamy an idea creates.
  8. 12. Company, known for cybersecurity basics software, recently deceased creator
  9. 15. often used as a financial tolerance policy, this is used to measure the amount of danger one can obtain without failure.