Across
- 3. address for accessing websites
- 4. software used for destruction
- 5. thief through computerized means
- 8. software to monitor computerized information
- 9. ID with magnetic access chip
- 11. off personal computer storage
- 12. lying about your location
- 14. holds data hostage
- 15. security tactics
- 17. level for information security
- 19. unsolicited meat banter
- 20. strength in the security structure
Down
- 1. weak point in security
- 2. used to harm your computer
- 6. the simplest part of security
- 7. a code for keeping secrets
- 10. needed for accessing secure information
- 13. blocks out unauthorized access
- 16. data to identify a person
- 18. casting cyber bait