Across
- 3. A unique address that identifies a device on the internet
- 5. A security mechanism that creates a virtual trap to lure attackers
- 6. Servers that are accessed over the internet
- 8. A network security device that monitors and filters incoming and outgoing network traffic
- 9. A form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords
- 10. A network of computers infected by malware that are under the control of a single attacking party
Down
- 1. Phishing attacks that involve the use of voice calls
- 2. An undocumented way of gaining access to computer system
- 4. A type of artificial intelligence used to create convincing images, audio and video hoaxes
- 7. The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable
