Across
- 3. a secured connection that can allow remote access to a corporate network.
- 6. secretly collects information from a victim’s device, such as user login credentials and system information.
- 7. is a form designed to encrypt files on device, rendering any files and the systems that rely on them unusable.
- 11. mainly used to prevent specific IP addresses, email addresses, or other identifiers from accessing a system or service.
- 13. conceals its true content to fool a user into thinking it’s a harmless file.
- 14. a technique for attempting to acquire sensitive data.
- 15. operates and maintains the infrastructure that connects online users to the internet.
Down
- 1. the conversion of data from a readable format into an encoded format.
- 2. an attack that tricks users into thinking they’re clicking on one thing when it’s the complete opposite.
- 4. originates from more than one source.
- 5. a device that has a network protection application installed to safeguard the network from intentional or unintentional intrusion.
- 8. the process of verifying the identity of a user, process, or device.
- 9. self-replication, often distributes copies of iself.
- 10. combining unique skills with activism, often targeting organizations, governments, or even criminal groups to protest actions or expose personal information.
- 12. a program designed to record which keys are pressed on a computer keyboard use to obtain passwords.
