My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

IT Security

Horizontales
Servers that are accessed over the internet
Part of a computer system or network which is designed to block unauthorized access while permitting outward communication
Process of converting information or data into a secure code, especially to prevent unauthorized access
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
Piece of code which is capable of copying itself - typically has a detrimental effect, such as corrupting a system or destroying data
Verticales
The name of a website
Fraudulent practice of sending emails purporting to be from reputable companies - goal is to get people to reveal personal information (i.e., passwords, credit card numbers)
When private information is disclosed to a third party without the owner's consent
Programs and other operating information used by a computer
Extra copy of data from a computer