Cybersecurity Terminology

12345678910111213141516171819
Across
  1. 3. Fishing for the highest target
  2. 4. Network security that filters access
  3. 6. Your personal cybersecurity methods
  4. 9. Computer program to fight attacks
  5. 10. Your personal key
  6. 13. Is it really you?
  7. 14. Flooding your servers
  8. 16. A virus is watching you
  9. 17. Make sure you block these
  10. 19. Who and what is allowed
Down
  1. 1. Malicious program
  2. 2. Gaining access without approval
  3. 5. Information accessed through a key
  4. 7. I'm not where I say I am
  5. 8. A computer infection
  6. 11. I don't want these emails
  7. 12. Holding your information captive
  8. 15. Your internet address
  9. 17. Casting a line for personal information
  10. 18. Software update to fix holes