Cybersecurity Key Terms

1234567891011121314151617181920
Across
  1. 2. Network of compromised computers.
  2. 3. Tracks users with hidden elements.
  3. 5. Unique numbers that identify device.
  4. 9. Protects data during encryption process.
  5. 13. Scrambling data to limit access.
  6. 14. Software that damages or disrupts.
  7. 18. Using technology to harass others.
  8. 19. Email scams targeting sensitive information.
  9. 20. Confirms identity before making changes.
Down
  1. 1. Detects, prevents, and removes malware.
  2. 4. Creating false realities using media.
  3. 6. Commonly available unsecured networks.
  4. 7. Blocks traffic and data flow.
  5. 8. Utilizing personal devices for work.
  6. 10. Helps create and store passwords.
  7. 11. Business strategy to improve cybersecurity.
  8. 12. Collects and shares sensitive information.
  9. 15. Malware that appears harmless.
  10. 16. Allows remote connection to networks.
  11. 17. Unauthorized users gain data access.