Across
- 3. A security method using fingerprints, face, or retina scans
- 5. A tool that records everything typed on a keyboard
- 7. A software that secretly monitors and collects user information
- 10. The process of verifying the identity of a user or device
- 11. Malware that locks or encrypts data and demands payment to release it
- 13. The process of converting data into a coded form to protect it
- 14. A harmful program that disguises itself as useful software
- 15. The illegal copying, use, or distribution of software
- 16. A set of rules for formatting and transmitting data over networks
Down
- 1. A hidden entry point used to bypass normal security
- 2. A protective barrier that blocks unauthorized access to or from a network
- 4. A group of infected computers remotely controlled by a hacker
- 6. A general term for any software designed to harm or exploit devices
- 8. The act of tricking people into revealing sensitive information online
- 9. A software used to detect, prevent, and remove malicious programs
- 12. A defined sequence of steps used to solve a problem or perform a task
