Across
- 3. - Malicious software designed to damage a system.
- 7. - A hidden method of bypassing security.
- 11. - Gathering personal information using deceptive emails.
- 13. - Coding used to protect information.
- 15. Address - Identifies the connection between a computer and the network provide
- 16. - Hardware that allows communication between a network and the Internet.
- 17. - A network of infected devices controlled by malware.
Down
- 1. - A security system that prevents intrusions.
- 2. - A system update that covers security vulnerabilities.
- 4. - A process that confirms a user’s identity.
- 5. - Someone who tries to gain unauthorized access.
- 6. - Distributed Denial of Service attack.
- 8. - Software that blocks access until money is paid.
- 9. - Virtual Private Network.
- 10. - Malware designed to remain hidden.
- 12. - A decoy system to attract attackers.
- 13. - Taking advantage of a computer’s vulnerability.
- 14. Breach - When information is stolen from a system.
