Across
- 2. The unabbreviated form of ISP
- 3. Software that illegally locks or denies access to files or part of a computer system until payment or favors are exchanged
- 6. Service that redirects your Internet requests through a secure path that is hacker proof
- 7. Software that allows a user to obtain information from another person’s computer activities without knowledge or consent
- 9. The IP in IP Address
- 10. A website interface that uses an identity in place of your own and blocks your actual IP Address
- 12. Type of IP Address that changes every time you restart a connection
- 13. An individual who uses computers and their networks to gain unauthorized access to data and files
- 14. Computer program that when running will replicate itself and modify other programs and files by inserting its code into them
Down
- 1. Network security system that monitors incoming and outgoing traffic to guard against untrusted networks or sites
- 4. Name for any type of software that is designed to cause damage to data, systems, or allow unauthorized access to areas of a network (examples are viruses, ransomware, and spyware)
- 5. Type of network that is very vulnerable to data breaches
- 8. Numerical label or tag associated that identifies your host and geographic location on the Internet
- 11. Type of IP Address that is configured once and stays the same until manually changed
