Across
- 1. Software that attaches or adds itself to other software
- 5. Software designed to monitor and record user activity on a computer
- 7. Hacking to promote a political cause
- 9. Virus that's responsible for $10B in damages and infected 80% of U.S. federal agencies
- 12. Gathering for developing innovative new software and hardware products
- 16. Ensuring data that should be private remains private
- 19. Software that encrypts personal data and locks it behind a paywall
- 20. Defect found in the "heartbeat" section of the OpenSSL code
- 21. Software designed to exploit specific system flaws
Down
- 2. Device used to collect card information from payment terminals
- 3. Trojan that accessed 70 million target customer's data
- 4. code library used to send and receive encrypted messages
- 6. "A coordinated army of compromised devices"
- 8. Spam messages intending to collect information to impersonate someone to steal money and goods
- 9. Goal of significant portion of hacking is to steal
- 10. Hidden entry point that bypasses normal security
- 11. Used to mean a "Computer virtuoso"
- 13. Malicious software disguising itself as a harmless program
- 14. Beginning of the Internet, linked universities, companies, and government installations
- 15. Hack used to damage Iranian centrifuges
- 17. ____ hacking, meant to impress and gain respect from peers
- 18. Characteristics that are biologically unique to an individual
