Across
- 2. The practice of securing systems, networks, and technologies from attacks and unauthorized access
- 7. A type of network security that filters incoming and outgoing traffic
- 9. When a legitimate website’s traffic is redirected to a fake site for malicious purposes
- 10. Disguising data so it’s impossible to decipher without authorization
Down
- 1. Using a device to mine cryptocurrency, without the device owner’s knowledge or permission
- 3. Sending emails with a forged sender address is called email...
- 4. Malicious software designed to disrupt a computer, server, or network
- 5. A chain of Internet-connected devices centrally controlled by a hacker
- 6. Email that you’ve technically solicited but it may serve little to no purpose to you
- 8. A tool that allows you to maintain online anonymity while using the Internet
- 11. DKIM and DMARC are both examples of a standard email authentication...