Across
- 4. - A secret string of characters used for authentication.
- 5. - Part of the internet that requires special software to access, often associated with illicit activities.
- 7. - Server that acts as an intermediary for requests from clients seeking resources from other servers.
- 9. - Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- 10. - Engineering technique that tricks people into giving away confidential information.
- 12. - Collection of computers and devices connected for communication and resource sharing.
- 14. - Technique of disguising communication from an unknown source as being from a known, trusted source.
- 15. - Software update to fix bugs or vulnerabilities (same as Across).
- 17. - A security system that controls incoming and outgoing network traffic.
- 19. - A deceptive scheme intended to cheat or defraud someone.
Down
- 1. - Person who gains unauthorized access to computer systems.
- 2. - Software that gathers information from a computer without permission.
- 3. - A software update that fixes vulnerabilities or improves functionality.
- 6. - A software tool designed to take advantage of a security flaw.
- 8. - Money demanded by hackers in exchange for access to compromised data.
- 11. - Software that automatically displays or downloads advertising material.
- 13. - Malicious software that gives unauthorized access to a computer system.
- 16. - Malicious code that infects computer files and spreads to others.
- 18. - A type of malware that spreads copies of itself across networks.
- 20. - Prefix related to computers or computer networks.
