Across
- 3. Method of encryption that does not require a secure channel to exchange keys
- 5. Pop Up Advertisements
- 6. Identifying and correcting errors and inconsistencies in data
- 8. Attempt to trick a user into divulging their private information
- 12. software intended to damage a computing system or to take partial control over its operation
- 15. Steals data and sends it back to malware creators
- 16. Social Media,Phones, Laptops, WWW, email are all types of...
- 18. Name, birthday, social security, address, etc.
- 19. System that monitors incoming and outgoing network traffic
- 20. What people look for when analyzing big data?
Down
- 1. Exhausting all possible combinations
- 2. Wireless access point that gives unauthorized access to secure networks.
- 4. Finding solutions to problems that would otherwise take forever to solve using only human capabilities
- 7. Practice of engaging a group for a common goal
- 9. Pair of keys used to encrypt and decrypt
- 10. Protects a computer by scanning files and identifying malware
- 11. The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- 13. Holding an computer hostage by encrypting data
- 14. Attacks that cause a website to slow down by flooding it with requests
- 17. Authentication that requires at least two steps to unlock protected information
