Across
- 6. Proving your identity
- 7. Encrypting files and holding them hostage for money
Down
- 1. A horse with a surprise
- 2. software designed to corrupt or steal information
- 3. Pretending to be someone you are not to extract information out of someone
- 4. A denial of service attack targets this
- 5. a brute force attack takes a long time to work on this