JDCyber Security

123456789101112131415
Across
  1. 3. The process of converting information or data into a code, especially to prevent unauthorized access.
  2. 6. A person who uses computers to gain unauthorized access to data
  3. 7. Sending of unsolicited and commercial bulk message over the internet is known as spamming
  4. 9. A software or hardware that prevents unauthorized access to a network
  5. 11. A program that attempts to damage a computer system and replicate itself
  6. 14. A wireless technology for exchanging data over short distances.
  7. 15. theft The crime of obtaining the personal or financial information of another person to use their identity to commit fraud
Down
  1. 1. are weaknesses in software programs that can be exploited by hackers to compromise computers
  2. 2. The space in which users share information, interact with each other; engage in discussions or social media platforms
  3. 4. Software that automatically displays or downloads advertising material
  4. 5. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. 8. Part of the web that can’t be accessed by normal browsers
  6. 10. practice of sending fraudulent communications that appear to come from a reputable source
  7. 12. An automated process that interacts with other network services
  8. 13. A smartphone application that allows users to transfer money between bank accounts.