Across
- 1. - When a perpetrator positions himself in a conversation between a user and application.
- 2. - Device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic
- 7. - A malicious piece of computer code designed to spread from device to device.
- 8. - information unreadable by anyone who is not explicity authorized to view the data.
- 10. - holds a victim's information at ransom.
Down
- 1. - a software designed to damage computer and computer system
- 3. - a program that provides continued privileged access to a computer while hiding it's presence.
- 4. - A large group of malware- infected internet- connected devices controlled by a single operator.
- 5. - attack meant to shut down a machine or network.
- 6. - it secretly gathers information and relays the data to other parties.
- 7. - Hide your IP address and physical location
- 9. computing - the delivery of hosted service
