Across
- 2. protect your information from hackers
- 4. on-demand services
- 5. Malware which changes, corrupts
- 10. thief to catch a thief
- 11. private encrypted network
- 12. identifying a user’s identity
- 14. An approach to security evaluation
- 16. allow hackers to remotely access
- 18. Faking origin Location
- 19. wide variety of bad software
Down
- 1. computers and associated peripherals
- 3. attempts to gain unauthorized access
- 6. applications that instruct a computer
- 7. fool the victim into giving
- 8. infected computer working together
- 9. attack on a computer system
- 13. virus detection technology
- 15. Using multiple hosts and users
- 17. innocent looking misleading computer program
- 20. Malware that can reproduce itself
