Cybersecurity

12345678910
Across
  1. 4. A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
  2. 6. shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
  3. 9. a network security device that monitors traffic to or from your network.
  4. 10. Coding used to protect your information from hackers.
Down
  1. 1. A hacker who is invited to test out computer systems and servers, looking for vulnerabilities "hacker ____ __ "
  2. 2. The process of identifying a user’s identity
  3. 3. malicious attempt to disrupt normal traffic to a web property.
  4. 5. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
  5. 7. a method of connecting a series of computers and devices in a private encrypted network,
  6. 8. A piece of audio or video that has been altered and changed to make it seem authentic or credible.