Across
- 3. security program looking for malware
- 5. multiple devices trying to flood a site in order to shut it down
- 8. malicious software
- 9. a network of computers used to carry out cyberattacks
- 10. a unique string of numbers that identifies a device
- 11. virtual private network
- 13. online harassment
- 14. media manipulation of an image or video to create a false reality
- 17. attack that exploits a vulnerability in software for the first time
- 18. collecting private information without consent
- 19. tries to gather your private information
- 20. cyber attack to tricks users into clicking on hidden elements
Down
- 1. wifi that is public to everyone in range
- 2. when sensitive data was leaked
- 4. an attack that wants money for access to your system back
- 6. protection against unauthorized access to data
- 7. protection codes
- 12. malware that appears to be harmless
- 15. a method of scrambling data so only authorized users have access
- 16. a trend in which people use person devices instead of work provided devices
