Across
- 2. The process of converting information or data into a code, especially to prevent unauthorized access
- 3. After a network attack your data may be ____________
- 5. An email or electronic communications scam targeted towards a specific individual, organization, or Business
- 7. Type of software that helps protect your computer against malware and cybercriminals
- 8. Someone who takes information from many sources and uses them to piece together a bigger puzzle
Down
- 1. What you maintain when you don't disclose information to unauthorized parties
- 4. Attacks that use email or malicious websites to infect your device
- 6. A secret word or phrase that be used to gain access
