Across
- 3. Software that secretly gathers information from a computer system
- 5. Illegal access into a telephone system to make unauthorized calls
- 9. A temporary fix for a program
- 10. A cybercrime involving pretending to be someone to trick victims or access sensitive information
- 11. When a program or system suddenly stops functioning
- 15. A weakness in a computer system
- 17. Multiple computers working together to solve a complex challenge
- 18. Technologies that use an individual's traits for identity verification
- 19. To remove or alter data that contains sensitive information
Down
- 1. Software that prevents users from accessing their data until payment is made
- 2. A method of bypassing a computer’s security measures
- 4. An attack that uses identity deception to access sensitive information
- 6. The process of converting plaintext into ciphertext
- 7. Software designed for harmful intent toward computer systems
- 8. Someone without permission who breaks into a computer system
- 12. An attack that redirects users to fake websites
- 13. Using two or more types of verification for authentication
- 14. Harmful software that can self-replicate and spread
- 16. Moral principles that prevent harm when using computer technologies
- 18. A network of devices controlled by bots from hijacked computers
