Across
- 3. The process of verifying a user’s identity
- 6. Software designed to detect and remove malware
- 7. A security system that blocks unauthorized access to a network
- 11. Malware that spreads on its own across networks
- 12. Software designed to harm or exploit a computer system
- 13. Malware that hides deep in a system to avoid detection
- 14. A secret word or phrase used to access accounts
- 16. A security method requiring two forms of verification
- 17. Using technology to harass or harm others
Down
- 1. Protection of computer networks from threats
- 2. A scam where attackers trick users into giving personal information
- 4. Software that secretly collects user information
- 5. The trail of data you leave online
- 8. The process of converting data into a secret code
- 9. When sensitive information is exposed or stolen
- 10. Malware that locks files and demands payment to unlock them
- 15. A malicious program that spreads by attaching to files
