Across
- 3. Programs that masquerade as useful utilities
- 5. Set of rules to examine email
- 7. Unsolicited messages
- 10. A procedure for encryption or decryption
- 12. A basic social media profile
- 13. A common wireless technology for connecting peripherals
- 15. Smartwatches and fitness trackers
- 17. Spam that uses a deceptive message
- 18. Helping a drone remain level as it flies
- 20. Any code to hide the existence of processes
- 21. The distance between colored crystals within a digital display device
Down
- 1. Keyboards, mice, and printers
- 2. Store passwords on a digital device
- 4. Describes information
- 6. Requests payment for an unlocking code
- 8. Redirect LAN traffic through a secondary malicious device
- 9. Devices that listen for and carry out voice commands,
- 11. Worms, and trojans
- 14. Calculates the distance between vehicles
- 16. Calculating the number of possible passcodes
- 19. A hacker’s LAN server
