My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

MLIS - Cyber

Across
_____ _____ is when someone gains access to a company's network to access valuable data or information
_____ _____ is when someone gains access to a computer network and transmits a malicious code
Event that must occur before a particular liability policy applies to a given loss (two words)
Down
Technique used by hackers to replace a company's website home page with a ransom demand
Any virus, malware, Trojan Horse, worm, etc. designed to insert itself into computer memory and spread to other computers
_____ ___ _____ insurance is coverage designed to cover consumers of technology services or products
_____ is a message(email) that falsely claims to be from a lawful business enticing you to provide PII.
___ is commonly referred to as the Internet of Things