1. 2. a system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds
  2. 4. program that hides in a computer and allows someone from a remote location to take full control of the computer
  3. 5. a process of encoding messages to keep them secret, so only "authorized" parties can read it.
  4. 8. malicious software
  5. 10. The act of securing and protecting individuals, businesses, organizations, and governments that are connected to the Internet and the Web.
  6. 11. the practice of obtaining something, especially money, through force or threats
  7. 15. usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
  8. 16. a technology that allows us to access our files/services through the internet instead of through the storage (hard drive) of our device.
  1. 1. the programs and other operating information used by a computer.
  2. 3. hackers use their social skills to trick people into revealing access credentials or other valuable information
  3. 6. fraudulently ask users to provide sensitive account information by posing as legitimate companies.
  4. 7. software that collects data about the user and transmits it over the Internet without the user's knowledge or permission
  5. 9. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  6. 12. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. 13. Part of a computer system that is designed to block unauthorized access
  8. 14. a group of two or more computer systems linked together.