Hackers, Scams, and Online Safety

1234567891011121314151617
Across
  1. 3. Online Harassment
  2. 7. Security Protects against unauthorized access
  3. 8. Media manipulation to change image
  4. 9. Designs, Builds, and tests cybersecurity
  5. 10. Cyber "kidnapping" for payment
  6. 13. Tricks for getting private information
  7. 14. Protects info from cyber attacks
  8. 15. Harmful Software
  9. 16. Collects private info without consent
  10. 17. work that uses personal devices
Down
  1. 1. Seemlessly harmful Malware until downloaded
  2. 2. Detects, prevents, and removes malware
  3. 3. Monitors networks for possible threats
  4. 4. Software for securing cloud data
  5. 5. Identifies device by internet connection
  6. 6. Compromised computers used for cyberattacks
  7. 7. Designer of data networks
  8. 11. Paid testers of cybersecurity
  9. 12. Scrambling date to restrict access