Across
- 1. Should be constructed of upper and lower case letters, numbers, and special characters
- 5. A flawed or weakness in computer system that could be exploited to violate the system's security.
- 7. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- 9. Hardware or software designed to prevent unauthorized access to or from a private network.
- 10. Unauthorized access to a network, information systems, or application.
Down
- 2. Verifying identity
- 3. Fraudulent email purportedly from a reputable company attempting to get a personal information.
- 4. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- 6. The address of a webpage. Check the validity of it before clicking on it.
- 8. A sequence of words or text used to control access to a computer; similar to a password.