Across
- 2. acquiring user info through deception
- 3. faking transmissions to gain access
- 4. software that provides unwanted ads
- 6. process to identify user identity
- 7. uses external verification to login
- 10. unauthorized transfer of information
- 12. software for spying on users
- 13. risk-reduction controls on a system
- 14. collection of compromised systems
- 16. capability to limit network traffic
- 17. distributed attack on a network
- 19. unwanted advertising/unsolicited emails
- 20. everyday objects connected to internet
Down
- 1. malicious program you pay to unlock
- 2. unencrypted information
- 5. cypher used to protect information
- 8. intrusive or malicious computer software
- 9. software used to protect systems
- 11. capture of data over networks
- 15. test to verify if human
- 18. process of decoding cyphers