Across
- 3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
- 4. Should be constructed of upper and lower case letters, numbers, and special characters
- 8. verifying identity
- 9. a type of software that is designed to display advertisements on a user's computer or device.
- 10. a type of software or hardware device that is designed to capture and record keystrokes made on a computer or other device
- 13. The “I” in the C-I-A Triad; protection from unauthorized changes
- 14. The “A” in the C-I-A Triad. It ensures authorized users have access
- 16. A fraudulent email purportedly from a reputable company attempting to get personal information
Down
- 1. Threatening behavior facilitated through electronic means such as texting
- 2. A type of malicious software designed to block access to a computer system until a sum of money is paid
- 5. weakness in a computer system that could be exploited to violate the system’s security
- 6. Software that scans a device or a network to detect security threats, alert the user, and neutralize malicious code
- 7. Facebook, Twitter, Instagram, etc. (Two words)
- 11. The process of taking plain text and scrambling it into an unreadable format
- 12. the act of secretly listening to or monitoring the conversations or communications of others without their knowledge or consent
- 15. enables a user to connect securely from outside to their business network, even though they are not located on their office premises