Across
- 4. the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc
- 7. a humorous or malicious trick
- 8. someone who seeks to breach defenses and exploit weaknesses in a computer system or network
- 9. a string of characters that allows access to a computer, interface, or system
- 10. a copy of a file or other item of data made in case the original is lost or damaged.
- 11. a type of Internet-based computing," where different services — such as servers, storage and applications — are delivered to an organization's computers and devices through the Internet.
- 12. a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.
Down
- 1. (of software) designed to detect and destroy computer viruses.
- 2. a software function that completes words or strings without the user needing to type them in full.
- 3. a form of criminal activity using social engineering techniques.
- 5. a program designed to attack the security of a computer system while ostensibly performing some innocuous function.
- 6. a cyber attack intended to redirect a website's traffic to another, fake site
