CROSSWORD-1
Across
- 2. a method, often secret, of bypassing normal authentication in a product
- 5. any software program in which advertising banners are displayed while the program is running
- 7. any malicious computer program which is used to hack into a computer by misleading users of its true intent
- 8. A phone call tactic in which individuals are tricked into revealing critical financial or personal information
- 9. a standalone malware computer program that replicates itself in order to spread to other computers.
- 10. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
Down
- 1. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 3. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- 4. are small files that Web sites put on your computer hard disk drive when you first visit
- 6. used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.