Across
- 2. Unauthorized attempt or access to an information system.
- 6. A type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
- 10. The practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information.
Down
- 1. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 3. The practice of protecting systems, networks, and programs from digital attacks.
- 4. A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.
- 5. Faking the sending address of a transmission to gain illegal entry into a secure system.
- 7. A weak spot in a computer system, which can be used to attack this system.
- 8. Unauthorized user who attempts to or gains access to an information system.
- 9. A type of malware that is aimed to infect and harm a file, a system, or a network.