Cybersecurity Terms

1234567891011
Across
  1. 2. Unsolicited commercial email, junk mail.
  2. 4. Small program that is timed to perform an operation on a system.
  3. 5. A place where commands can be entered in Linux.
  4. 9. Takes advantage of code flaws that have very recently been discovered.
  5. 11. A program that blocks access until a ransom is paid.
Down
  1. 1. Appears to be legitimate but really contains malicious code.
  2. 3. Proving who you are so trust can be established.
  3. 6. Software that installs advertisements on the PC in the form of toolbars or popups.
  4. 7. Software that gathers data and forwards it without consent.
  5. 8. Something you have.
  6. 10. Files that appear to be legitimate programs, but really contain malicious code.