Across
- 5. – A fraudulent scheme, often online, to steal money or information.
- 9. – Malware that demands payment to restore access.
- 10. – Using technology to harass or bully someone.
- 11. – Faking identity or location to deceive.
- 13. – Process of encoding data to protect it from unauthorized access.
- 15. – A network of infected computers controlled remotely.
- 18. – Software that records keystrokes to capture information.
- 19. – Software that automatically displays or downloads ads.
Down
- 1. – Software that secretly collects user information.
- 2. – A person who breaks into computer systems.
- 3. – A scam to trick people into giving personal information.
- 4. – Malware that replicates itself to spread across networks.
- 6. – Security system that monitors and controls network traffic.
- 7. – Software designed to harm or exploit systems.
- 8. – Malicious code that attaches itself to programs and spreads.
- 12. – Stealing someone's personal information to impersonate them.
- 14. – Malware disguised as legitimate software.
- 15. - An unauthorized way to access a system.
- 16. – Distributed Denial of Service, an attack that overwhelms a network.
- 17. – Another term for Trojan malware.
