Across
- 2. When an intruder takes over a victims information by tricking them in any way they find necessary
- 5. A form of malware that can infect a computer, and hurt it and the information stored on said computer
- 7. A secondary form of verification in order to log into certain accounts across the internet
- 10. A way of keeping your identity safe on the internet by tricking intruders into thinking you are someone, or live somewhere you do not
- 11. The cause of all the hurt caused to the victim once an intruder has invaded the victims device
- 12. The protection used to prevent intruders from stealing, corrupting, or damaging any data/computing device
- 17. A form of protecting certain information by making it into unreadable text that is only readable by having the right authorization
- 18. The way a device keeps itself up to date with the latest and most secure version of itself
- 20. A connection between two or more devices across the virtual world
Down
- 1. A type of malware where the intruder corrupts a victims date, and requires payment before returning said data to the victim
- 3. A form of tricking a victim into believing that they are someone they are not via an email
- 4. The incident of an intruder gaining unauthorized access to certain information
- 6. A way of notifying companies, organizations, or others that you were recently attacked virtually
- 8. When an intruder tries to attack ones device via many different methods
- 9. A form of keeping certain information hidden behind a certain string of words
- 13. Creating a copy of certain data on a separate device or on the same computer in order to keep it in case of said data becoming corrupted in the future
- 14. Being able to access certain devices by being completely away from said device
- 15. When an intruder tries to disguise themselves as a trusted source to trick a victim to allowing them into there device
- 16. A device used to send packets to a certain network on the internet
- 19. Information that has been translated into a certain form that is easily readable by computing devices