Across
- 2. The process of taking plain text and scrambling it into an unreadable format
- 3. A secure network that allows users to connect to the internet privately and safely
- 5. information that a website puts on a user's computer.
- 6. Threatening behavior facilitated through electronic means such as texting.
- 10. The āaā in the C-I-A Triad
- 12. A collection of compromised computers used to perform coordinated attacks
- 13. The second "D" in DDO
- 14. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
Down
- 1. The "U" in url
- 4. Hardware or software designed to prevent unauthorized access to or from a private network
- 7. The āIā in the C-I-A Triad
- 8. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
- 9. A type of malicious software designed to block access to a computer system until a sum of money is paid
- 11. Unauthorized access to a network, information systems, or application.
