Cybersecurity

12345678910111213141516171819
Across
  1. 1. cable preventing theft of mobile devices
  2. 3. network virus
  3. 7. unwanted email messages
  4. 9. storing files from hard drive remotely
  5. 10. malicious code stored in files
  6. 12. tricking victim into giving information
  7. 16. bring your own device
  8. 17. verifying a user's identity
  9. 19. sending fake emails to scam
Down
  1. 2. UI redress attack
  2. 4. malicious software
  3. 5. attack that changes devices' address
  4. 6. malware requiring payment to fix
  5. 8. false warning from fake senders
  6. 10. masks user's location
  7. 11. network of hacker computers
  8. 13. website generated file storing info on your computer
  9. 14. scrambling information necessitating a passkey
  10. 15. instructions commanding browser actions
  11. 18. malware hidden within another program