Across
- 2. malicious code that presents itself as something it is not
- 5. network attack involves the disabling or corruption of networks, systems, or services
- 6. allows traffic that originated from inside the local network to return through the firewall from outside the network
- 9. someone who steals your personal information
- 10. network attack that replicated and attacks other computers
Down
- 1. communication between you and your friend but someone else is monitoring you
- 3. after looking at your data, they change the data
- 4. the duplication of critical components or functions of a system with the intention of increasing reliability of the system
- 7. someone trying to gain control of your system by trying to crack the password
- 8. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
