RU ITEC411 Chapter 5

1234567891011121314151617181920212223242526
Across
  1. 3. t ricking people into giving access or information
  2. 5. hacking to support a political or social cause
  3. 7. using body features like fingerprints for security
  4. 9. software that looks safe but is actually harmful
  5. 11. a weakness in a system that can be exploited
  6. 13. scrambling data so only authorized users can read it
  7. 14. a program that spreads on its own through networks
  8. 16. a program that spreads by attaching to other files
  9. 17. a system that blocks unwanted network access
  10. 19. getting into a computer system without permission
  11. 22. a hidden way to access a system later
  12. 24. a software update that fixes security problems
  13. 25. a group of infected devices controlled by a hacker
  14. 26. fake messages used to trick people into giving information
Down
  1. 1. harmful software made to damage or steal data
  2. 2. protecting systems networks and data from attacks
  3. 4. important systems like power or hospitals that must stay running
  4. 6. a group that responds to cybersecurity emergencies
  5. 8. proving a user is who they say they are
  6. 10. software that locks files and demands money to unlock them
  7. 12. using someone else personal information for fraud
  8. 15. software that secretly watches what a user does
  9. 18. a hacker who breaks the law and causes harm
  10. 20. a hacker who is between good and bad
  11. 21. an attack that overloads a website so it stops working
  12. 23. a hacker who helps improve security