Across
- 1. Overwhelming a server with traffic, in short
- 5. ___ force attack: trial-and-error password cracking method
- 7. Social engineering tactic involving made-up scenarios
- 8. Self-replicating malware that spreads without needing a host file
- 9. Software that filters out unwanted junk in your inbox
- 11. Umbrella term for all malicious software
- 13. Software that detects and removes hidden surveillance tools
- 14. Digital barriers that block unauthorized access
Down
- 2. Secretly gathers data on you without consent
- 3. Malware disguised as legitimate software
- 4. Network of hijacked computers under remote control
- 6. Software that protects your system from malicious programs
- 10. Infected computer controlled remotely, like the undead
- 12. Malicious code that replicates by attaching to clean files
- 13. Annoying pop-ups and promos installed with free apps
