Across
- 6. Multiple compromised computers
- 7. Trial and error password guessing
- 9. Layered security system
- 12. Malware locked by bribe
- 13. Copy of computer data
- 14. Junk emails or posts
- 15. Character sequence used for access
- 18. Electronic inventory of someones network
Down
- 1. Identity verification
- 2. Private and secure network
- 3. Software created to disrupt
- 4. Recording keystrokes in real time
- 5. Tracking user on a server
- 8. Identifying entities on the internet
- 10. File link to another location
- 11. Protection through scrambled data
- 13. Locate/display information on servers
- 14. Malware that monitors and reports
- 16. Pretending to gain trust
- 17. Searching or screening data