Cybersecurity Terms
Across
- 2. Unsolicited commercial email, junk mail.
- 4. Small program that is timed to perform an operation on a system.
- 5. A place where commands can be entered in Linux.
- 9. Takes advantage of code flaws that have very recently been discovered.
- 11. A program that blocks access until a ransom is paid.
Down
- 1. Appears to be legitimate but really contains malicious code.
- 3. Proving who you are so trust can be established.
- 6. Software that installs advertisements on the PC in the form of toolbars or popups.
- 7. Software that gathers data and forwards it without consent.
- 8. Something you have.
- 10. Files that appear to be legitimate programs, but really contain malicious code.