Security/Safety Terminology

12345678910111213141516171819202122
Across
  1. 1. Verifying identity of a user
  2. 5. Term for fraudulent business
  3. 6. (2words) P2P network used by criminals
  4. 8. Used to access the internet
  5. 10. Unauthorized intrusion into a computer
  6. 15. Identifies a network address
  7. 16. (2 words)Simulation of human intelligence
  8. 18. Allows to connect to Internet
  9. 19. Junk e-mail
  10. 20. High-speed data transmission system
  11. 21. Wireless technology for exchanging data
  12. 22. Programs used on digital devices
Down
  1. 2. special high-speed storage mechanism
  2. 3. Decides Computers and Humans Apart
  3. 4. Malicious software program on computer
  4. 7. Malware that replicates to spread
  5. 8. Capacity of a communication channel
  6. 9. Converting data into secret code
  7. 11. Malicious software developed by hackers
  8. 12. Small files stored on computer
  9. 13. Network resources to lure hackers
  10. 14. Virtual perimeter around a network
  11. 17. cryptographic algorithm for encryption