Across
- 4. Portable chip storing cellular connection
- 5. Network Defense against unauthorized access
- 7. Deceptive scheme to trick victims
- 8. Fraudulent attempts to steal your data
- 10. File or document sent electronically
- 12. Cybercriminal skilled in breaching security
- 14. Online content displayed in a browser
- 15. Bad software directed at computers
- 17. Digital Crimes committed using technology
- 19. Developer updates to fix vulnerabilities
- 20. Essential access code for security
Down
- 1. Identifies you using something you are
- 2. Affects system displaying unwanted ads
- 3. Virus that disguises as legitimate software
- 6. Holds data hostage for money
- 9. Records users keystrokes to steal information
- 11. Physical object used for authentication
- 13. Detects and removes viruses
- 16. Unauthorized software that gathers information
- 18. Way to secure data trough coded algorithms