Across
- 2. short for any malicious software
- 6. digital brick layered wall of security
- 9. vulnerability no one is aware of yet
- 11. collect/transmit private user info
- 13. identifies device is connected to internet
- 14. appears harmless/conceals malicious intent
- 15. monitors security protection measures
- 17. designs, tests, implements security system
- 18. media manipulation/false perception
- 19. fool's user into providing private info
- 20. analyst that designs data communication
Down
- 1. Also known as "crackers"
- 3. clicking hidden elements "UI redress attack"
- 4. Germany had great message _____ until, Alan Turing
- 5. "penetration testers" works with organization
- 7. software to detect, prevent/remove cpu infections
- 8. compromised computers to carry out attacks
- 10. digital technology harassment
- 12. prudent to use a ____ whenever possible
- 16. locks out user for Bitcoin