Across
- 3. Code to keep intruders out
- 5. Bring Your Own Laptop
- 7. Completely Automated Public Turing Test
- 9. Hacking a computer to mine cryptocurrency
- 10. On demand computing over the internet
- 14. Verifying a users identity
- 16. two or more connected computers
- 17. Video or Audio altered to display something different then originally intended - usually malicious
- 18. Theft of Sensitive data by hackers
Down
- 1. Replicating, damaging malware that spreads
- 2. Data Loss Prevention
- 4. Protects code from hackers
- 6. Bullying over the internet or with the use of technology
- 7. The practice of tricking someone to click something they didnt intend to
- 8. Distributed Denial of Service
- 11. Multifactor Authentification, or Two Factor Authentification
- 12. Series of connected compromised computers
- 13. Code designed to carry out a task
- 15. Internet Protocol
