Across
- 4. A group of connected, independent devices
- 5. A cyberattack where scammers impersonate companies to steal your information
- 6. A service that creates a secure, encrypted "tunnel" for your internet traffic
- 11. Any program designed to disrupt, damage, or gain unauthorized access to a computer system or network
- 12. Raw, unorganized, and unprocessed information, facts, or observations
- 13. A security incident where unauthorized individuals gain access to confidential, sensitive, or protected data
Down
- 1. This monitors, filters, and controls incoming and outgoing data
- 2. A person with advanced technoligical skill that uses their skill to gain unorthorised access
- 3. The process of turning readable information into un-readable code
- 7. A secret string of characters—letters, numbers, and symbols—used to verify a user's identity
- 8. A type of malicious software (malware) designed to replicate itself
- 9. A network of internet-connected devices
- 10. A set of changes to a computer program, software, or operating system
