Across
- 2. Malware that can reproduce itself
- 9. phishing that targets a specific individual
- 10. program that is run entirely from the network
- 11. encrypted parts of the internet
- 13. hacker poses as a legitimate business
- 14. attack on a computer system
- 15. technology used to keep intruders out
- 16. breach hacker successfully breaking into a system
- 17. Coding used to protect your information
- 18. computer infected with a virus
Down
- 1. contains items that are temporarily blocked
- 3. capture of data as its being transmitted
- 4. process of identifying a user
- 5. a private network across a public network
- 6. records keystrokes made on a computer
- 7. malware that hijacks your system
- 8. malware used by hackers to spy on you
- 10. tricked into clicking on a object on a web page
- 12. hacker changes the IP address of an email
- 16. video that has been altered to make it authentic