Across
- 6. software that holds your data hostage
- 8. helps make sure that a user types in the correct url to get into a desired website
- 10. where a bunch of false information paper on ur screen forcing u to click on it causing for ur device to get infected
- 12. one option that can help protect your business against losses resulting from a cyber attack
- 15. a way of fighting against Phishing attacks by verifying the emails that are being sent
- 17. the act of imitating to be someone reputable and convince another person to reveal information
- 18. one of the most safest way to secure wireless connections
- 19. convert data into a code to prevent unauthorized access
- 20. a system to block unauthorized data
Down
- 1. the act of protecting systems from digital attacks
- 2. when data has been leaked or obtained in an illegal way
- 3. a service that hosts websites for clients, it facilitates maintenance of a site and makes it accessible on the World Wide Web
- 4. a action of trying to steal someone information
- 5. a series of letter that only a trusted person would know it provides security to accounts
- 7. a way to identify email from spoofers
- 9. designed to disrupt, damage, or gain unauthorized access to a computer system.
- 11. group of Computers that share user information
- 13. when a person attempts to want to help u out wit a problem in ur computer
- 14. a group of private computers that infect malicious software
- 16. act of passing as someone, once you have accessed his private information