Cybersecurity

12345678910111213141516
Across
  1. 2. Shield users against viruses.
  2. 4. A series of numbers located on routers.
  3. 9. Protecting sensitive business information.
  4. 12. The opposite of a solution.
  5. 13. Should be kept hidden.
  6. 14. Two or more computers connected together.
  7. 15. Hacker successfully breaking into a system.
  8. 16. Laptop, Phone, etc.
Down
  1. 1. Attack on the Wifi system.
  2. 3. Used to keep intruders out.
  3. 5. Coding used to protect your information from hackers.
  4. 6. Apps.
  5. 7. Attackers scamming victims.
  6. 8. Malware which changes, corrupts, or destroys information.
  7. 10. Connected to on devices.
  8. 11. A group of applications.