Across
- 1. Scammers that try to take your personal information through call, messages, or pop-ups
- 3. A group of private comupters that are used to infect malicious software
- 5. A form of malware that uses advertisements
- 6. An attack that tries to gain access to your computer or device
- 10. A scam someone impersonates you or you impersonate them
- 14. A virus that may harm your device from illegal website ads and etc
- 15. A strict form of security that enhances your accounts security
- 16. An option that can can help protect your business against a loss from a cyber attack
- 17. Best encryption to use for protecting information
- 19. A secure system that blocks unwanted data
- 20. Set of instructions used to operate computers
Down
- 2. Puts control on a database and limits access
- 4. A form of manipulation that is used to get control over a computer
- 7. Helps protect customers privacy
- 8. A scammer that makes a fake email address that looks like the one from your company
- 9. A place or area where a group of networks are used
- 11. A safe way to help secure your account so people can't hack you or use your account
- 12. Bypassing a existing security system of a company
- 13. Keeps all your personal information safe and network
- 18. A form of malware that requires you to pay a ransom
