Across
- 3. a network of private computers infected with malicious software and controlled as a group without the owners' knowledge,
- 4. the fraudulent practice of sending emails to be from reputable companies in order to get individuals to reveal personal information, such as passwords and credit card numbers.
- 5. an attack or entry into computer or network of computers, usually by hackers or malicious software that compromises sensitive data or causes damage to computers or network function.
- 7. convert (information or data) into a cipher or code, especially to prevent unauthorized access.
Down
- 1. violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices."
- 2. a string of words that must be used to gain access to a computer system or service.
- 6. a person who uses computers to gain unauthorized access to data.
- 8. a string of characters that allows access to a computer system or service.
