Across
- 3. Software that build on to another software.
- 5. Utilizing cyberattacks for acts of war
- 6. Manipulating people to release personal information.
- 7. A collection of computers on the internet that have malware that transmits to a central host owned by a hacker
- 8. biological characteristics that are different for each individual.
- 10. Created by a Cornell University grad student who released it on the internet
- 12. A hacker whose intentions are malicious and unethical.
- 13. software that does not need to build on to another software to carry out its function.
- 16. Malware that takes note of user activities on the users device or machine.
- 17. Stealing a person's social security number, drivers license number, or phone number.
- 19. Multiple step login process
- 20. Malware that seizes all files and prompts the user a message demanding a request in order to have the files released.
Down
- 1. Attracting users to false websites where people collect their personal data
- 2. searching for weaknesses and vulnerabilities in a system for your organization
- 4. A hacker that helps improve security and finds system vulnerabilities for a good cause.
- 9. Microsoft windows, macOS, and linux are examples of an
- 11. A person who purposefully releases computer viruses and gets into computer systems without permission.
- 14. Under this law it is illegal to enter a device without autherization
- 15. Fake spam emails pretending to be from an important organization, including a false link for a user to click.
- 18. Malware that seems to be safe but actually is malicous
