Across
- 2. a group of compromised devices that have a singular central host
- 4. ensuring data is not changed unintentionally and is consistent
- 7. malware that secretly monitors activity on a device
- 8. things such as fingerprints, retina patterns, DNA
- 10. abbreviation for the Act that requires the design of telecommunications equipment to allow the gov't to intercept phonecalls
- 13. broad term for things such as a virus, worm, trojan horse, etc.
- 14. hackers with good intentions
- 15. software that allows access to a device bypassing security
- 16. malware that attaches to another software
- 18. fraudulent spam that arrives via text message
Down
- 1. use of hacking to promote a particular political agenda
- 3. verifying someone or something is what they claim to be
- 5. opposite of decryption
- 6. malware that removes access to files on a computer and demands payment to return access
- 8. hackers with malicious intent
- 9. tricking people into giving you information accidentally/unknowingly
- 11. software designed to fix a bug
- 12. fradulent spam that takes place via email
- 14. malware that does not need to attach to another software and spreads like a disease
- 17. abbreviation for attack in which hackers take down a service with excessive requests
