Across
- 4. The use of the Internet or other electronic means to stalk or harass an individual.
- 7. The unauthorized use of someone else’s computer to mine cryptocurrency.
- 10. An attack that overwhelms a system with traffic, rendering it inaccessible.
- 13. Unauthorized intrusion into a computer or a network.
- 14. The method by which information is converted into secret code that hides the information's true meaning.
- 15. A function used in blockchain to convert an input of letters and numbers into an encrypted output.
- 16. A set of rules to be followed in calculations or other problem-solving operations.
- 19. The very first block in a blockchain.
- 21. A network security system that monitors and controls incoming and outgoing network traffic.
- 22. A list of records linked together using special cryptographic operations across a distributed network of computers.
- 23. The process of executing and deploying a blockchain in a specific environment.
- 25. Protecting digital content creators' rights.
- 26. A device that forwards data packets along networks.
- 27. An identification string that defines a realm of administrative autonomy, authority or control within the internet.
- 30. A decentralized form of network structure central to blockchain technology.
- 32. The electronic equivalent of a handwritten signature, used to authenticate digital documents.
- 33. A key characteristic of blockchain, where no single entity has control over the entire network.
Down
- 1. A split in the blockchain where the chain diverges into two potential paths forward.
- 2. The process of validating new transactions and recording them on a blockchain.
- 3. A way for smart contracts on the blockchain to interact with data outside of their network.
- 5. Records of events that happen in an operating system or other software.
- 6. Determining which legal system applies in digital transactions.
- 7. The art of writing or solving codes, a key aspect of blockchain technology for ensuring secure transactions.
- 8. The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, credit card numbers, etc².
- 9. A type of malware that encrypts a victim's files and demands payment to restore access.
- 11. A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.
- 12. A type of fraud where criminals trick individuals into providing sensitive data.
- 17. The loss of signal strength in networking cables or connections.
- 18. the theft of credit card information during online transactions.
- 20. An open-source, blockchain-based platform that enables developers to build and deploy decentralized applications.
- 22. The maximum rate of data transfer across a given path.
- 24. Any computer that connects to the blockchain network.
- 28. Malicious software designed to cause damage to a computer or network.
- 29. A record of all transactions that have taken place in a blockchain network.
- 31. A hardware or software component that stores data so future requests for that data can be served faster.
