Across
- 2. Software update designed to fix security flaws
- 10. Cyberattack that overwhelms a system with requests
- 11. A secret entrance to a system that bypasses security systems
- 13. The use of biological identifiers for stronger security
- 14. Federal law for prosecuting computer crimes
- 15. The use of text messages for phishing
- 17. Criminals use the identification of an innocent person to commit crime
- 19. Malware that encrypts the files on a computer and demands payment for decryption
Down
- 1. Software designed with malicious purposes
- 3. Storage medium that uses spinning magnetic disks
- 4. Use of cyberattacks for military purposes
- 5. Hackers that engage in illegal malicious activities
- 6. Fraudulent messages designed to steal information
- 7. Software that bridges to computer hardware
- 8. Devices that illegally collect credit card information when a card is inserted
- 9. A network of hacked computers that carry out coordinated attacks
- 12. Suppressing or filtering digital content
- 16. Use of hacking for political purposes
- 18. Converting readable information into a unreadable format
- 20. Hackers that help organizations find flaws in their systems
