Across
- 2. Impersonation of another device or user on a network.
- 4. A secret key that protects your digital accounts.
- 7. Secret agents in software form, spying on your computer activities.
- 8. A process to confirm someone is who they claim to be.
- 10. A weakness in a system that can be exploited.
- 12. A secure tunnel for data on the internet.
- 14. A coding error that might cause programs to behave unexpectedly.
- 15. A person who breaks into computers, often for malicious reasons.
- 17. Malicious software disguised as legitimate.
- 18. A digital kidnapper of data, demanding payment for release.
- 19. Scrambling data to protect it from prying eyes.
Down
- 1. Ensuring that authorized parties can access information when needed.
- 3. A digital barrier protecting a network from unauthorized access.
- 4. A deceptive attempt to steal sensitive information via email.
- 5. Manipulation techniques to trick people into breaking security procedures.
- 6. Unwanted software that displays ads on your screen.
- 9. Protection against unauthorized data alteration.
- 11. This program defends your computer against malicious agents.
- 13. Malicious software designed to harm or exploit any programmable device.
- 14. Network of computers infected with malicious software intented to cause harm.
- 16. A self-replicating program that spreads through networks.