Across
- 5. creating a fake identity on a social network account or dating website
- 7. an error, flaw, failure, or fault in a computer or system
- 8. programs that automatically execute tasks as ordered by the creator of the program that has infected them
- 10. after these are downloaded, opened, or executed, your data becomes corrupt
- 11. programs and other operating systems used by a computer
- 12. a type of malicious software that disguises itself as a harmless program
- 13. a cyber attacker
- 15. private network VPN
- 16. an attack when a person or program disguises themselves as another
- 19. malware used to gain access to a user's system or data
- 20. authentication attaching a phone number or email to an account for extra security
- 21. short for malicious software
- 22. breach when sensitive, protected, or confidential information is intentionally released to an untrusted environment
- 24. engineering taking advantage of human trust to gain access to private information
Down
- 1. customizable additions to software for extra functionality
- 2. secret word or phrase used to gain access
- 3. method of obtaining user info through fraudulent communications targeted directly at people
- 4. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers
- 6. the way in which the identity of a user is confirmed
- 8. cryptocurrency
- 9. software that automatically displays or downloads material when a user if offline
- 14. a form of malware used to threaten victims by blocking, publishing, or corrupting their data unless a ransom is paid
- 17. technology IT
- 18. an internet traffic filter meant to stop unauthorized traffic
- 23. the physical and tangible parts of a computer