Across
- 2. An email or phone call you DON'T want
- 4. When hackers fake who they are
- 6. A piece of software that takes your computer hostage
- 9. A type of software that keeps people safe on a network
- 13. Getting people to hack for you, without them knowing it
- 15. A pieces of software that copies itself and infects other computers
- 17. A piece of software that burrows into a network and spreads itself
- 18. A flaw in software that a hacker may take advantage of
- 19. Any form of BAD software, like a virus or trojan
- 20. A hacker who is not bad, but they may not be good
- 21. A zombie computer
Down
- 1. A hidden way into a computer system
- 3. A Distributed Denial Of Service attack
- 5. An email looking to steal someone's personal info
- 7. Stealing and publishing someone's personal information
- 8. A piece of software that infects the very basic parts of a computer
- 10. A hacker who helps companies and schools secure their networks
- 11. A hacker who wants to steal information or cause havoc
- 12. A computer exploit that JUST came out
- 14. A tool to solve an encrypted message
- 16. Secure Socket Layer Technology
- 21. A network of zombie computers
