Across
- 4. Biological user authentication methods
- 9. Software used to prevent cyberattacks
- 11. Malicious web browser advertisements
- 12. Publishing private user information
- 13. Blocks fraudulent network traffic
- 15. Maliciously placed computer system infection
- 17. Attacker changes DNS server information
- 18. Intimidating and threatening electronic communication
- 19. Words used for account access
Down
- 1. Tracks user's keystrokes
- 2. Practice of protecting computer systems
- 3. Computer networks used for cyberattacks
- 5. Forceful hacker password guessing technique
- 6. Fraudulent solicitation through an email
- 7. More than two authentication techniques
- 8. Requires users to confirm identity
- 10. Tracks user's online behavior
- 11. Plans and implements security measures
- 14. Malicious click tricks
- 16. Use of fake website addresses