Across
- 3. cybersecurity professionals who identify and fix security vulnerabilities
- 7. collect and transmit private user information
- 8. creates and stores strong passwords
- 9. exploits a new vulnerability in software
- 11. prevents unauthorized changes to a system’s settings and files
- 16. software that combats malware infections
- 17. codes that protect data during encryption
- 19. floods a website or server with traffic
- 20. a network of compromised computers
Down
- 1. ubiquitous access points using wireless hotspots
- 2. tricks users into clicking on hidden elements
- 4. looks safe, but isn't
- 5. a secure service that connects remotely to another network
- 6. training to protect sensitive information from cyber-attacks.
- 10. they illegally exploit network vulnerabilities to gain unauthorized access
- 12. blocks unauthorized access to or from a computer network
- 13. steals sensitive information or gains access
- 14. fake email that fools users into providing information
- 15. scrambles data to prevent unauthorized access
- 18. locks users out of their computer for a ransom