Across
- 3. short for malicious software.
- 5. someone trying to access data that isn't authorized.
- 6. unintended software or hardware problem.
- 10. computers infected with malicious software.
- 12. converting information into a code.
- 13. a physical device connected to a computer network.
- 14. a network security device.
- 18. Day recently discovered exploits.
- 19. technological processes for telling a computer which tasks to perform.
Down
- 1. practice of securing information and communication through writing and solving codes.
- 2. refers to a weak point or flaw.
- 4. an identity verification process.
- 7. an intersection where networks with different transmission protocols meet.
- 8. Web only accessible through special software or tools.
- 9. cybercriminals disguise their identity.
- 11. is a type of malware.
- 15. software tool to access another machine without being detected.
- 16. a malicious program that infects computers.
- 17. a group of connected computers.
- 19. is a form of fraud.