Across
- 3. Secret unknown access point into a system
- 8. Flaw or potential for harm
- 9. Virus that infects a computer before the operating system loads
- 11. Following the rules or standards that have been established
- 13. Software that is embedded in hardware
- 14. Computer code intentially written to cause some form of harm
- 15. Using a lie or scam to obtain private information
- 16. Physical token inserted into a computer's usb port
Down
- 1. Measurement and analysis of a biological feature
- 2. Condition of being pricate or secret
- 4. Something that takes a vulnerability to a level where it can be exploited
- 5. Encrypts data do user connot access it intil a fee is paid to hacker only
- 6. Acions of ,alicous code
- 7. Proccess by which something becomes harder it is made harder to hack
- 10. State of being complete or uncorrupted
- 12. Technology that thracks a users' keystokes on the keyboard