Across
- 4. Collection of computers running malicious programs
- 8. Virtual perimeter around network
- 9. AI-generated video and audio used to deceive
- 12. Type of data identifying an individual
- 13. Common type of fraud used to social engineer
- 14. Everyday objects connected to the web
- 16. Malicious software used to obtain money from victims
- 18. Type of spyware that records what you type
- 20. Electronic money
Down
- 1. The use of messaging to harass someone
- 2. Weaknesses in software
- 3. Used to verify if you're a human or a robot
- 5. Simulated network resources designed to entice
- 6. Playbook for emergencies
- 7. Quick-repair job
- 10. Physical devices that connect to a network
- 11. Malicious program built for infection
- 13. The practice of challenging security systems to discover vulnerabilities
- 15. Coolest people on the planet
- 17. Least cool people on the planet
- 19. Process of verifying identity
- 21. Sets of login data used to verify identity