Introduction to Cyber Security

123456789101112131415161718
Across
  1. 2. protects the wireless internet
  2. 4. signature sent with email to acknowledge that it was verified
  3. 6. security is broken and data was stolen
  4. 7. verifying a user's identity
  5. 9. a verification for servers to see what can send an email
  6. 11. foreign foreign software designed to harm a computer
  7. 12. protocol that protects internet communication
  8. 16. securing data from outside threats
  9. 18. programs used when running a PC
Down
  1. 1. latest version of security for wireless internet
  2. 2. allows your website to be published online
  3. 3. using radio waves to connect between nodes in a network
  4. 5. frauding as a trusted source to steal information
  5. 8. protection from cyber threats
  6. 10. making a copy of a data/file
  7. 13. disguising themself to steal information
  8. 14. malware to deny a user of their data
  9. 15. using means necessary to access someone else's device
  10. 16. communication through the use of electronic devices over networks
  11. 17. a protection against fake email addresses that are disguised to be real ones