Across
- 1. Verifying identity of a user
- 5. Term for fraudulent business
- 6. (2words) P2P network used by criminals
- 8. Used to access the internet
- 10. Unauthorized intrusion into a computer
- 15. Identifies a network address
- 16. (2 words)Simulation of human intelligence
- 18. Allows to connect to Internet
- 19. Junk e-mail
- 20. High-speed data transmission system
- 21. Wireless technology for exchanging data
- 22. Programs used on digital devices
Down
- 2. special high-speed storage mechanism
- 3. Decides Computers and Humans Apart
- 4. Malicious software program on computer
- 7. Malware that replicates to spread
- 8. Capacity of a communication channel
- 9. Converting data into secret code
- 11. Malicious software developed by hackers
- 12. Small files stored on computer
- 13. Network resources to lure hackers
- 14. Virtual perimeter around a network
- 17. cryptographic algorithm for encryption