Across
- 4. 2 or more computers/devices connected together to share resources
- 8. The process of identifying a user's identity
- 9. Coding used to protect your information from unauthorized access
- 11. a form of malware that spies on you and your computer activities
- 13. acronym for Virtual Private Network
- 14. an update released to fix bugs and other vulnerabilities
- 15. Used to keep intruders out
Down
- 1. Software or device that has a flaw that can be exploited
- 2. software or hardware used to combat viruses
- 3. malware that looks legitimate, like the Greek horse
- 5. MALicious softWARE
- 6. a copy of data that is used in case of emergencies
- 7. Software that is used to encrypt a user's files then demand ransom
- 10. Trying to get sensitive information through social engineering
- 12. the act of using a vulnerability