CyberSecurity

12345678910
Across
  1. 1. Should be constructed of upper and lower case letters, numbers, and special characters
  2. 5. A flawed or weakness in computer system that could be exploited to violate the system's security.
  3. 7. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  4. 9. Hardware or software designed to prevent unauthorized access to or from a private network.
  5. 10. Unauthorized access to a network, information systems, or application.
Down
  1. 2. Verifying identity
  2. 3. Fraudulent email purportedly from a reputable company attempting to get a personal information.
  3. 4. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  4. 6. The address of a webpage. Check the validity of it before clicking on it.
  5. 8. A sequence of words or text used to control access to a computer; similar to a password.