CyberSecurity
Across
- 2. Process of identifying a user
- 4. Changing your IP address to read a false location
- 5. A group of applications used to complete a task
- 8. Virtual Private Network
- 10. A series of computers connected as one entity
- 11. Collection of programs that allow remote access to hackers
- 13. Malware that tracks your activities
- 14. Virus detection technology
- 16. Malicious software
- 18. Hackers using scams to attain sensitive info
- 19. Malware that reproduces itself
Down
- 1. Two or more connected computers sharing resources
- 3. Tricking a user into clicking onto something they didn't want to
- 6. Coding used to protect sensitive data
- 7. Network of infected computers
- 9. Malware that holds your system hostage
- 10. Distributed Denial of Service
- 12. Internet protocol
- 15. Malware that manipulates data and spreads to other systems
- 17. tech used to keep out unwanted users