Across
- 3. software designed to disrupt, damage or gain unauthorized access to a computer system
- 4. a process to identify who should to have access to a system
- 6. malicious software designed to block access to computer system until money is paid
- 7. an electronic device used for processing and storing information
- 9. an input device used with a computer
- 10. a network security controller and monitor
Down
- 1. cyberattack tactic designed to scare someone into visiting a spoofed or infected website
- 2. the process of converting information or data into a code to prevent unauthorized access
- 5. 2 or more computers connected together to share resources
- 8. emails sent appearing to be from legitimate sources designed to trick the receiver into giving out information