Across
- 3. any kind of software designed to damage, or enable unauthorized access, to computer systems.
- 4. a form of electronic cash
- 7. A malicious threat to a group or organization that comes from someone within
- 8. A secret word or phrase that is used to access a computer system or service.
- 9. An internet traffic filter meant to stop unauthorized incoming.
- 10. A language used to create and control the content on a website
- 12. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- 13. A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
- 15. it allows you to create a secure connection to another network using the internet.
- 17. A cyber attacker who uses software and social engineering methods to steal data and information.
- 18. Software that is in a constant state of updating. Intended to be convenient to the user and meant to disrupt hackers.
- 19. Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
Down
- 1. Code that is embedded into the hardware of a computer.
- 2. A form of malicious software that disguises itself as a harmless computer program
- 5. The core of a computer’s operating system that houses the most essential functions of the computer.
- 6. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- 7. Confirmation of someone's identity, either using a password or a fingerprint.
- 11. Creating a fake identity on a social network account
- 12. An error, flaw, failure in a computer program
- 14. is the string of numbers used to identify each computer using the internet on a network.
- 16. Customizable additions to software for extra functionality.