the depths of man
Across
- 3. Internet Protocol; 3322 College Dr, Vineland, NJ 08360
- 5. Any hacker who attempts to gain unauthorized access to a system with the intent to cause mischief, damage, or theft.
- 8. The process of identifying a user’s identity
- 9. Any technology, be it software or hardware, used to keep intruders out
Down
- 1. A hacker who is invited to test out computer systems and servers, looking for vulnerabilities.
- 2. The result of a hacker successfully breaking into a system
- 4. Coding used to protect your information from hackers. Think of it like the code cipher
- 5. A combination of the words “robot” and “network”
- 6. A portmanteau of “malicious” and “software”, describing a wide variety of bad software.
- 7. Can reproduce itself for the purposes of spreading itself to other computers in the network.