Across
- 3. Malicious software
- 6. ___ Engineering. Hackers us this skill to trick people into revealing private information .
- 8. Software that collects data about a user and transmits it over the internet without the user’s knowledge/permission.
- 10. A technology used when working remote that secures information going to/from LMC’s servers.
- 11. Software Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
- 12. A technology that allows us to access our files through the internet from anywhere in the world. Hint: it also brings rain.
- 13. A group of computers, printers and devices that are interconnected.
Down
- 1. A system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds.
- 2. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 4. A process of encoding messages to keep them secret, so only “authorized” parties can read it.
- 5. Who do you call for help?
- 7. A sequence of words (spaces and punctuation too) used for authentication.
- 9. Piece of code that replicates itself in order to spread the infection to other connected computers.