Across
- 2. Compromised computers attaacking other computers
- 5. Tricks user into clicking
- 6. False perception of reality
- 8. Taking data hostage
- 12. Denying one's internet service
- 13. Attempt to gain sensitive information
- 15. Multiple computers connected as one
- 16. Corrupts or destroys information
- 18. Harassing others online
- 19. An address from your modem
- 20. Gain access to a computer
Down
- 1. Unauthorized access to data
- 3. Connecting to another secure service
- 4. Preventing unauthorized access to network
- 7. A key created by you
- 9. Reproduces it's self
- 10. Scrambling data for protection
- 11. Prevent infections on a system
- 14. Collecting information secretly
- 17. Attacks system once opened