Across
- 3. a directory used to organize and store computer files
- 4. a form of cyberattack in which criminals insert themselves between entities in a communication channel to steal data
- 7. a technique where an attacker impersonates a trusted source to trick victims into revealing information
- 9. Person who seeks ways to circumvent software protections
- 10. a social engineering attack used to steal sensitive information by impersonating trusted entities
- 12. any software that displays advertisements while collecting revenue for its developer
- 13. a set of software tools that enable an unauthorized user to gain control of a computer system without being detected
- 14. malware that encrypts data and demands payment to restore access
- 17. malicious software designed to infiltrate or damage a system
Down
- 1. a form of malware or hardware that keeps track of and records your keystrokes as you type
- 2. a type of phishing that uses voice scams to trick victims into disclosing information
- 5. cryptographic protocol that ensures secure communication over a computer network
- 6. security measure of the question-answer authentication type
- 8. a security system that monitors and controls network traffic
- 11. a network of compromised devices remotely controlled by a cybercriminal
- 15. short for World Wide Web, a system of interlinked webpages
- 16. a false message or claim spread to deceive or mislead users
