Across
- 2. Protocol that is meant for uploading and downloading files.
- 6. Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
- 9. A computer program that keeps a log of your keystrokes on your keyboard.
- 11. The process by which two information systems establish a communication channel.
- 12. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
- 14. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
- 15. A bundle of programs that is designed to bombard users with advertisements.
Down
- 1. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- 3. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- 4. a cyber attack intended to redirect a website's traffic to another, fake site.
- 5. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
- 7. A bunch of several Internet-connected devices that is infectious and controlled by a specific type of malware.
- 8. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- 10. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- 13. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
