Across
- 2. a piece of software that is designed to fix errors in preexisting software
- 4. the use of hacking for a political cause
- 10. fake websites that are used to steal personal information
- 12. malware that encrypts files on a computer and then demands payment to decrypt the files
- 13. biological characteristics that are unique to an individual
- 14. this attack overloads a target site with requests for information
- 17. malware that monitors and records a user's activity on their device
- 18. software that allows future access to a device by bypassing the normal security checks
- 20. devices attached to card readers that can collect card numbers and pins
Down
- 1. flaws in a system that can be exploited
- 2. fraudulent messages that impersonate people or organizations in order to steal the target's information
- 3. a group of Internet connected devices infected with malware that communicates with a central host
- 5. software that searches for and removes malware on a device
- 6. a verbal statement that is false and damaging to one's reputation
- 7. a program that copies itself to other computers
- 8. malicious software
- 9. intentional, unauthorized access to a computer system
- 11. In the early days of computing, this would be a creative programmer who wrote clever or elegant code
- 15. a written statement that is false and damaging to one's reputation
- 16. deceiving users by faking data, usually to make a communication appear to be from a trusted source
- 19. software that attaches itself to other software
