CW_1

123456789
Across
  1. 2. Comprised of any number and variety of interconnected devices
  2. 3. a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
  3. 4. weaknesses in software programs that can be exploited by hackers to compromise computers.
  4. 6. string of characters used to verify the identity of a n user during the authentication process
  5. 8. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  6. 9. A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
Down
  1. 1. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
  2. 3. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. 5. a network security system that filters unsanctioned incoming and outgoing traffic.
  4. 7. a type of malware that is aimed to infect and harm a file, a system or a network