Across
- 4. when cyber criminals deceive others by acting as someone or something else. usually through email or messages
- 6. a security violation in which sensitive/confidential information has been accessed/stolen by an unauthorized person
- 7. pretending to be someone else in order to get someones personal information
- 9. sends signals to devices
- 12. someone listening to a conversation to gain personal information
- 13. intrusive software made by cyber criminals to damage/destroy computers and computer systems
- 16. checking a users credentials to see if they are allowed to access the protected information
- 17. any activity to protect the functionality and contents of information
- 18. preventing and detecting threats to protect information being stolen/tampered with
- 20. a device used to access the worldwide web
Down
- 1. manipulating or influencing someone to gain access to their computer personal information
- 2. monitors incoming and outgoing networking traffic
- 3. the programs and other operating information used by a computer
- 5. a type of malware that grows and spreads throughout the device inf
- 8. a type of malware that threatens to release personal information if they don't pay a ransom
- 10. securing networks by actively seeking out weaknesses in the defense
- 11. attackers deceiving people into revealing personal info or download malware
- 14. detects and destroys computer viruses
- 15. a computer program that can copy itself and infect a computer without the users permission/knowledge
- 19. a form of security in which information is converted into cypher-text
