Across
- 1. Breach Result of a hacker breaking into a system
- 3. Attack an attempt to breach a security boundary
- 5. method of connecting a series of computers
- 6. malware used to spy on your computer activities
- 8. Horse computer program that looks innocent
- 10. video or audio that has been altered
- 11. document storage
- 12. Where a hacker poses as legitimate business
- 13. When someone is tricked into clicking on one object when they want to click on another
- 16. Test commonly referred to as a Pen Test
- 17. collection of programs that allow hackers to access a computer
Down
- 2. system to shield against viruses
- 3. document storage
- 4. Malware that highjacks your system
- 7. Apps that instruct a computer to carry out a task
- 9. process of identifying a users identity
- 10. Black Hat Tool
- 14. When a hacker changes the IP address that comes from a trusted source
- 15. Malware that can reproduce itself
- 18. Address Pretty much anything connected to the internet
