the depths of man

123456789
Across
  1. 3. Internet Protocol; 3322 College Dr, Vineland, NJ 08360
  2. 5. Any hacker who attempts to gain unauthorized access to a system with the intent to cause mischief, damage, or theft.
  3. 8. The process of identifying a user’s identity
  4. 9. Any technology, be it software or hardware, used to keep intruders out
Down
  1. 1. A hacker who is invited to test out computer systems and servers, looking for vulnerabilities.
  2. 2. The result of a hacker successfully breaking into a system
  3. 4. Coding used to protect your information from hackers. Think of it like the code cipher
  4. 5. A combination of the words “robot” and “network”
  5. 6. A portmanteau of “malicious” and “software”, describing a wide variety of bad software.
  6. 7. Can reproduce itself for the purposes of spreading itself to other computers in the network.