Across
- 3. process of going from cipher text to plain text
- 4. A type of attack where user sends a fraudulent message to trick a person
- 6. A network system that monitors and controls incoming and outgoing traffic
- 8. A tool to mask location by changing your ip address
- 9. A weakness in a program that can be exploited
- 10. A violation where sensitive data is compromised
Down
- 1. process of going from plain text to cipher text
- 2. Distributed denial of service. makes website unusable by flooding it
- 5. Technique used to manipulate people in order to receive sensitive information
- 7. malicious software that wreaks havoc on a computer
