Across
- 1. prevents unauthorized changes
- 4. scrambling data
- 9. UI redress attack
- 10. false perception of reality
- 13. disguised attacks
- 14. fools users into providing sensitive information
- 15. personal laptop, smart phones, ect
Down
- 2. online harassment
- 3. virtual private network
- 5. locks users out until they pay
- 6. short for malicious software
- 7. prevents unauthorized access
- 8. transmits information without user knowing
- 11. codes that protect data
- 12. carry out cyber attacks on other systems