Across
- 2. records keystrokes and sends its info to a hacker
- 4. (three words) a term used to describe everyday objects that connect to the internet (such as fridges, thermostats, and smart speakers)
- 11. verifying your identity with a username, password, or other piece of information
- 13. hackers demand a ransom for the return of information after deploying this
- 14. an audio or video clip that has been edited and changed to seem believable
- 15. malware disguised as legitimate software
- 16. the most common form of cryptocurrency
Down
- 1. (two words) manipulating and deceiving people to get sensitive and private info; lying
- 3. the practice of protecting critical systems and sensitive information from digital attacks
- 5. emails, text messages, or other communication designed to convince you to give the sender personal information
- 6. sends information from your computer to a third party without your knowledge
- 7. short for malicious software
- 8. use this to protect your information
- 9. a way of hiding information
- 10. a network security device that filters incoming and outgoing websites
- 11. displays unauthorized ads on a user's screen
- 12. short for virtual private network