Across
- 3. Online Harassment
- 7. Security Protects against unauthorized access
- 8. Media manipulation to change image
- 9. Designs, Builds, and tests cybersecurity
- 10. Cyber "kidnapping" for payment
- 13. Tricks for getting private information
- 14. Protects info from cyber attacks
- 15. Harmful Software
- 16. Collects private info without consent
- 17. work that uses personal devices
Down
- 1. Seemlessly harmful Malware until downloaded
- 2. Detects, prevents, and removes malware
- 3. Monitors networks for possible threats
- 4. Software for securing cloud data
- 5. Identifies device by internet connection
- 6. Compromised computers used for cyberattacks
- 7. Designer of data networks
- 11. Paid testers of cybersecurity
- 12. Scrambling date to restrict access