Cybersecurity

123456789101112131415161718192021
Across
  1. 3. Implanted malware with a fee.
  2. 4. Linked computers with a virus.
  3. 6. Copy of computer's hard drive.
  4. 8. Program that stores passwords.
  5. 9. Emails sent by unknown sender.
  6. 10. Take someone's identity for fraud.
  7. 12. Upper/lowercase letters, numbers, symbols
  8. 14. Hardware tracking keystrokes.
  9. 15. Multiple computers that are connected.
  10. 16. Protective barrier.
  11. 19. Identity verification of physical appearance.
  12. 21. Private network.
Down
  1. 1. Scrambled data unlocked with key.
  2. 2. Software used to infect computers.
  3. 5. Code sent to phone.
  4. 7. Software attacks unshielded computer components.
  5. 9. Malware hackers operate.
  6. 11. Not easily accessible without URL.
  7. 13. Website stored preferences.
  8. 17. Computer address changed.
  9. 18. Hacker posing as someone else.(Email)
  10. 20. Malware disguised as another program.