Cybersecurity

1234567891011121314151617181920
Across
  1. 3. bullying another digitallly
  2. 4. hides in other programs
  3. 6. copying files to store
  4. 8. file that tracks your preferences
  5. 9. a strongly motivated attacker
  6. 11. spreads without user interaction
  7. 13. sequence of secure characters
  8. 14. falsely claiming legitimacy to hack
  9. 17. malicious software
  10. 18. unwanted email message
  11. 20. wireless data network
Down
  1. 1. scrambling security method
  2. 2. unlocking encrypted information
  3. 5. proving you are real
  4. 7. a threat from within
  5. 10. code that reproduces itself
  6. 12. discard from digital devices
  7. 15. a false warning
  8. 16. holds information until money is paid
  9. 19. sifting through data