Across
- 3. Any technology, be it software or hardware, used to keep intruders out.
- 4. Software package that performs a specific function directly for a person who is intended to use a computer system.
- 8. A piece of audio or video that has been altered and changed to make it seem authentic or credible
- 10. A scam where a hacker poses as a legitimate business or organization
- 11. Using multiple hosts and users, hackers bombard a website with a tidal wave of requests
- 12. A set of instructions, or a system of rules, written in a particular programming language
- 14. A computer program that can copy itself and infect a computer without permission
- 16. A mode in the computer that stores data on servers in different locations
- 18. Two or more computers connected together to share resources
- 20. A method of connecting a series of computers and devices in a private encrypted network,
- 22. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
- 23. A form of malware that hijacks your system and encrypts your files
- 24. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches
- 25. While someone is tricked into clicking on one object on a web page when they want to click on another,
Down
- 1. A means of attack on a computer system
- 2. A technique to prevent unauthorized users from accessing sensitive data
- 5. Smallest unit of a digital image
- 6. A set of rules governing the format of data sent via the internet or local network.
- 7. The capacity a network can transfer data
- 9. Allows devices to communicate with each other
- 13. Coding used to protect your information from hackers.
- 15. The result of a hacker successfully breaking into a system
- 17. A form of malware used by hackers to spy on you and your computer activities.
- 19. Any attempt to breach a logical environment's security boundary
- 21. a misleading computer program that looks innocent, but in fact allows the hacker into your system