Across
- 3. Malware aimed to corrupt or modify data on one computer before spreading to others.
- 4. a sequence of letters, characters, and numbers used for authentication
- 7. a technique used in order to manipulate and deceive people into handing over sensitive information.
- 8. A network device that determines what information is able to enter a system based on the rules in place.
- 9. a technique to obtain sensitive information typically through text messaging
- 10. the process of encoding data so that it can only be accessed by its intended recipient.
- 12. the state of being exposed to the possibility of being attacked
- 13. the act of appearing to be someone or thing that you are not
Down
- 1. measures taken in order to protect systems and their data.
- 2. A network that uses encryption in order to in order to maintain privacy.
- 4. a technique to obtain sensitive information typically through email.
- 5. Software that locks your device and hold the data hostage and demands a price.
- 6. intrusive software developed to wreak havoc on systems; also known as malicious software
- 11. a sequence of words used for authentication.
- 12. is the act of confirmation through evidence of somethings validity.