Across
- 1. Tricks you by posing as real company
- 6. Altered Audio/Video to trick users
- 7. Periodic security updates
- 11. Virus that appears to be useful
- 13. Coding to hide info from hackers.
- 15. Software demanding money to unlock Personal information
- 17. Technology used to keep intruders out
- 19. Uses Hand, Voice, and face recognition
Down
- 2. Unauthorized access to an information system
- 3. Series of numbers assigned
- 4. Fake Website/URL Address
- 5. Storage for infected files
- 8. Unexpected failure of a system component
- 9. Online storage
- 10. Weaknesses in a system
- 12. Masks IP address and location
- 14. Denied access/Privileges
- 16. Applications with instructions for computer tasks
- 18. Malware that self reproduces
- 19. used to auto-perform repetitive tasks