Cyber Threats and Security

1234567
Across
  1. 3. Creating fake documents or signatures to deceive others.
  2. 4. Small text files stored on a computer by websites to remember user preferences or track activity.
  3. 7. A security feature that isolates suspicious files to prevent them from harming the system.
Down
  1. 1. A cyberattack that redirects users from a legitimate website to a fake one to steal information.
  2. 2. Online harassment where someone repeatedly follows or monitors another person digitally.
  3. 5. Software designed to detect and remove malicious programs from a computer.
  4. 6. Security barriers that block unauthorized access to or from a private network.