Join the fight against climate change

12345678910
Across
  1. 3. A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge
  2. 5. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies
  3. 8. Obtaining user information through fraudulent communications targeted directly at people
  4. 9. A secret word or phrase that is used to access a computer system
  5. 10. Computer security programs that simulate network resources that hackers are likely to look for to lure them in and trap them
Down
  1. 1. Attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else
  2. 2. Internet traffic filter meant to stop unauthorized incoming and outgoing traffic
  3. 4. Contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed
  4. 6. The process of decoding cipher text to plain text, so it is readable by humans
  5. 7. Any kind of software designed to damage, or enable unauthorized access to systems