Across
- 3. A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge
- 5. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies
- 8. Obtaining user information through fraudulent communications targeted directly at people
- 9. A secret word or phrase that is used to access a computer system
- 10. Computer security programs that simulate network resources that hackers are likely to look for to lure them in and trap them
Down
- 1. Attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else
- 2. Internet traffic filter meant to stop unauthorized incoming and outgoing traffic
- 4. Contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed
- 6. The process of decoding cipher text to plain text, so it is readable by humans
- 7. Any kind of software designed to damage, or enable unauthorized access to systems
