Across
- 4. The process of confirming the correctness of the claimed identity.
- 6. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
- 7. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- 8. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- 9. A set of programs that tell a computer to perform a task.
- 11. A technique used by hackers to obtain sensitive information.
- 12. The most widely-installed LAN technology.
Down
- 1. A type of malware that functions by spying on user activity without their knowledge.
- 2. A term to describe connecting multiple separate networks together.
- 3. the process of transforming an encrypted message into its original plaintext.
- 5. A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.
- 6. Another kind of malware that allows cybercriminals to remotely control your computer.
- 10. The essential center of a computer operating system, the core that provides basic services for all other parts of the operating system.
