Across
- 4. altered video to spread disinformation
- 6. unique string that identifies device
- 8. helps protect system
- 9. malware that transmits private data
- 11. helps prevent unauthorized network access
- 12. flood website/server until crash
- 15. codes that protect data
- 17. cybersecurity professionals
- 19. designs data communications network
Down
- 1. unauthorized access to sensitive info
- 2. software designed to disrupt system
- 3. plans and implements security
- 5. remote encrypted network access
- 7. helps prevent unauthorized access
- 10. criminal hackers
- 13. requests payment to unlock
- 14. malware hidden inside legitimate file
- 16. mimics legitimate websites/emails
- 18. network of computers used for cyber attacks