Across
- 3. Tricks you by posing as a real company
- 5. coding to hide information from hackers
- 6. Audio/video altered to assume credibilty
- 7. Harmful programs like viruses/trojans
- 10. Used to auto-perform repetitive tasks
- 12. Intruder changes IP address of an email
- 14. Malware that hijacks and encrypts files
- 15. Malware that can reproduce itself and spread
- 16. Unauthorized access to a network
- 18. Weakness in a system
- 20. Tricked into clicking on web page object
Down
- 1. Creates a secure encrypted connection
- 2. Software used to protect from intruders
- 4. Malware used to spy on computer activity
- 8. Verifying user identity
- 9. Malware that changes/corrupts information
- 10. "Bring your own device" policy
- 11. Online data storage system
- 13. Network of computers infected with a virus
- 17. Two or more computers connected together
- 19. The address of a webpage