Cybersecurity/Safety

1234567891011121314151617181920
Across
  1. 2. short for any malicious software
  2. 6. digital brick layered wall of security
  3. 9. vulnerability no one is aware of yet
  4. 11. collect/transmit private user info
  5. 13. identifies device is connected to internet
  6. 14. appears harmless/conceals malicious intent
  7. 15. monitors security protection measures
  8. 17. designs, tests, implements security system
  9. 18. media manipulation/false perception
  10. 19. fool's user into providing private info
  11. 20. analyst that designs data communication
Down
  1. 1. Also known as "crackers"
  2. 3. clicking hidden elements "UI redress attack"
  3. 4. Germany had great message _____ until, Alan Turing
  4. 5. "penetration testers" works with organization
  5. 7. software to detect, prevent/remove cpu infections
  6. 8. compromised computers to carry out attacks
  7. 10. digital technology harassment
  8. 12. prudent to use a ____ whenever possible
  9. 16. locks out user for Bitcoin