Across
- 3. a computer security term for an isolated environment where any suspicious or unknown code can run without putting the host device or network at risk.
- 4. a type of malicious software designed to disrupt a victim’s computer, server, or network.
- 6. A chain of Internet-connected devices centrally controlled by a hacker
Down
- 1. the process of disguising data so it’s impossible to decipher without authorization
- 2. a type of email that you’ve technically solicited but may serve little to no purpose to you.
- 5. tools that ask people to verify they are human and not robots