Across
- 2. the practice of securing information and communication through writing and solving codes
- 3. a code that gives you access to a site
- 5. a group of connected computers
- 7. cyberattack that fools people into revealing personal info
- 8. a type of cryptocurrency that is well-known
- 9. malware that tricks users by thinking they are clicking safe links
- 12. software that holds your data hostage in return for something they want
- 13. network of compromised computers used in a cyberattack
- 15. manipulated media images usually used to scam people
- 16. a program that encrypts your internet traffic by scrambling your IP address
- 17. method of scrambling data, only an authorized user can use
- 18. a string of numbers used to identify a computer
- 19. a person who infiltrates a computer
- 20. a place where data can be stored but it is not on an internal hard drive
Down
- 1. software that infects and destroys computers' data
- 4. software used to detect, prevent, and remove malware
- 6. computerized intelligence that forms to make and execute life-like decisions
- 8. an unintended hardware or software problem
- 10. an attack on somebody in a digital way of force
- 11. the act of data being leaked from a source
- 12. a set of software tools that gives user access without being detected
- 14. malware that collects and transmits your private data