Cybersecurity

1234567891011121314151617181920
Across
  1. 2. fake email that fools users
  2. 5. online harassment
  3. 7. small files stored on PC
  4. 8. tricking victims into buying online
  5. 9. bring your own device
  6. 10. junk mail
  7. 12. replicating computer program malware
  8. 13. virtual private network
  9. 17. prevents unauthorized access
  10. 18. fraudulent business practices
  11. 19. following employee into restricted are
  12. 20. malware that collects and transmits
Down
  1. 1. wireless technology
  2. 3. unauthorized intrusion
  3. 4. codes that protect data
  4. 6. bypassing security (hidden method)
  5. 11. name used identify someone online
  6. 14. harmful software
  7. 15. malicious "horse" software
  8. 16. telephone scam