Across
- 2. The act of being in accordance with established guidelines.
- 4. When someone is using another person's information maliciously.
- 7. A security method that encodes data to make it more secure.
- 10. A valuable tool for developing applications.
- 13. A group of connected computers that share user account information and a security policy.
- 15. This must be protected from unauthorized access.
- 17. A special computer designed for technical or scientific applications.
- 18. Establishing something as genuine.
- 19. In technology, this means maintaining hardware and software.
- 20. Relating to software,a company that develops and sells products.
Down
- 1. Programs on hardware.
- 3. When you open a malicious email or text that is disguised as a legitimate one.
- 5. A service that provides technology-related help.
- 6. A type of secure connection.
- 8. A type of coverage that insures in case of a cyber attack.
- 9. When data is stolen from a system without the system's owner noticing.
- 11. A string of letters, numbers, and/or symbols used for verifying identity.
- 12. A person who commits fraud and/or is involved in fraudulent schemes.
- 14. Malicious software that holds data hostage until a ransom is paid.
- 16. Disguising an unknown source as a known source.