Across
- 4. it with a flood of traffic from a team of computers.
- 5. often by using emails or fake websites that look like they are from trusted organizations.
- 7. until it is decrypted using a secret key.
- 10. The amount of data that can pass through a network or part of a network per second.
- 12. programs.
- 13. A distributed denial of service attack attempts to make an online service, like a website, unavailable by
Down
- 1. Software designed to block malware from entering protected networks.
- 2. Consists of code written in a programming language that instructs computers to perform specific tasks.
- 3. The process of using codes to make readable information unreadable. Encrypted information cannot be
- 6. Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
- 8. effort to draw attention to political or social issues.
- 9. Attempting to trick people into revealing sensitive information, such as passwords and credit card
- 11. Someone who uses computers and computer networks to disrupt services or share secret information in
