Across
- 3. Technology that allows access to your files through the internet from anywhere in the world
- 7. The practice of sending malicious communications that appear to come from a reputable source
- 13. The process of defending computers and data from malicious attacks
- 14. Holds your computer files hostage for money
- 15. When data is accessed and taken from a system without authorization
- 18. Software designed to detect computer viruses
- 19. Group of computers under malicious control
- 20. Digital alteration of a person's likeness or voice
Down
- 1. A copy of files to protect and restore digital data in the event of damage or loss
- 2. A computer infected with malware that is part of a botnet
- 4. A computer program used for accessing sites or information on the internet
- 5. Defensive computer technology installed to deny unauthorized entry to a system
- 6. Type of malware that spreads copies of itself from computer to computer
- 8. A program or code designed to take advantage of a security flaw in a computer system
- 9. The potential for loss, damage, or destruction of assets or data
- 10. The action of keeping careful watch for possible danger or threats
- 11. General term to describe malicious software
- 12. Common term for a cybercriminal
- 16. A new piece of software released by the vendor to fix a vulnerability
- 17. Relating to the characteristics and culture of computers, information technology, and virtual reality
