Across
- 4. locks computer until ransom is paid.
- 5. “bring your own device”.
- 7. network of computers for cyberattacks.
- 9. “UI redress attack”.
- 10. malware appears harmless - malicious actions.
- 11. secures data on cloud infrastructure.
- 14. fake email - provides sensitive information.
- 16. built-in security feature operating systems.
- 17. IT software - protects against threats.
- 18. unknowingly transmits private user information.
- 19. protects data during encryption process.
- 20. scrambling data - authorized users can access.
Down
- 1. malicious software - damage computer system.
- 2. system protects against unauthorized access.
- 3. attacks unknown vulnerability in software.
- 6. users connect to wireless hotspots.
- 8. Protects against violation of a network.
- 12. distributed denial of service attack.
- 13. cyber-physical systems for high-value environments.
- 15. virtual private network.
