Across
- 3. Change IP on email to seem legitimate
- 4. Attempts access with malicious intent
- 5. When hacker successfully get information
- 6. Fake made to seem real
- 9. Coding to protect information
- 12. Misleading computer program
- 15. Spying on personal information
- 16. Tricks them into selecting wrong thing
- 18. Stops Viruses
Down
- 1. Spams website with lots of requests
- 2. prevents other users from hacking
- 7. Two or more computers connected
- 8. Malware which is made to damage
- 10. Bad software that infects devices
- 11. Technology to keep intruders out
- 13. Holds your files until given money
- 14. Hacker poses as a business
- 16. Data not on computer goes here
- 17. Internet Protocol
- 19. Replaces your IP with another