Across
- 4. A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware
- 6. The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above
- 7. Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message
Down
- 1. A combination of the words “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
- 2. A form of malware used by hackers to spy on you and your computer activities
- 3. Any technology, be it software or hardware, used to keep intruders out
- 5. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications