Across
- 5. Software that monitors user activities and reports them to a third party
- 7. A test that outlines the steps to restoring data after a severe setback
- 8. A successful hack to gain control of a network and leak its data
- 10. A scan hackers use to detect areas of weakness via sending messages to identify activity
- 12. a type of computer network device that interconnects with other networks using the same protocol
- 13. An intermediary server between a user and the internet that protects the enterprise from outside intrusion
- 15. The practice of adhering to standards and regulatory requirements
Down
- 1. An AI-manipulated video in someone’s likeness to spread misleading information
- 2. Malicious software often in the form of spam emails
- 3. A misleading computer program with a name deriving from Greek history
- 4. A scam perpetrated by a hacker posing as a legitimate
- 6. A small update to fix bugs in existing programs
- 9. A special code to protect your digital information
- 11. An internal computer network closed to outsiders
- 14. A network that disguises users’ IP addresses with its own to deter hackers