All Things Cybersecurity
Across
- 3. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 5. Small files that Web sites put on your computer hard disk drive when you first visit.
- 9. Algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- 10. Someone who seeks and exploits weaknesses in a computer system or computer network.
Down
- 1. A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- 2. The process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- 4. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- 6. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 7. An attempt by hackers to damage or destroy a computer network or system.
- 8. A local or restricted communications network, especially a private network created using World Wide Web software.