Across
- 5. a barrier between a trusted network and an untrustworthy network.
- 8. tries to access data they aren’t authorized to view.
- 9. a form of malware. It is designed to block users from accessing a computer system until a sum of money has been paid.
- 12. a physical device connected to a computer network.
- 13. converting information into a code to prevent unauthorized access.
- 14. process for telling a computer which tasks to perform in order to solve problems.
- 18. cybercriminals disguise their identity as a trusted source to exploit an unassuming user.
- 20. anti-malware
Down
- 1. weak point or flaw
- 2. short for malicious software
- 3. converting coded or encrypted data to its original form.
- 4. a form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
- 6. converting plain data into an encrypted format.
- 7. network of private computers infected with malicious software.
- 10. attempts by hackers to cause harm, destroy, or access sensitive information.
- 11. unintended software or hardware problem
- 15. a set of software tools that give users access to another machine without being detected.
- 16. a group of connected computers
- 17. infects computers
- 19. serve as the entry and exit points for all data.