Quiet their watching you....

123456789101112131415161718
Across
  1. 1. Breach Result of a hacker breaking into a system
  2. 3. Attack an attempt to breach a security boundary
  3. 5. method of connecting a series of computers
  4. 6. malware used to spy on your computer activities
  5. 8. Horse computer program that looks innocent
  6. 10. video or audio that has been altered
  7. 11. document storage
  8. 12. Where a hacker poses as legitimate business
  9. 13. When someone is tricked into clicking on one object when they want to click on another
  10. 16. Test commonly referred to as a Pen Test
  11. 17. collection of programs that allow hackers to access a computer
Down
  1. 2. system to shield against viruses
  2. 3. document storage
  3. 4. Malware that highjacks your system
  4. 7. Apps that instruct a computer to carry out a task
  5. 9. process of identifying a users identity
  6. 10. Black Hat Tool
  7. 14. When a hacker changes the IP address that comes from a trusted source
  8. 15. Malware that can reproduce itself
  9. 18. Address Pretty much anything connected to the internet