Cyber

12345678910111213
Across
  1. 2. Vulnerability is a ---------- which allows an attacker to reduce a system’s information assurance.
  2. 5. If you encounter a ransomware attack, the first thing you should do is pay the ransom. True or False?
  3. 6. a type of software designed to help the user's computer detect viruses and avoid them.
  4. 9. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
  5. 12. (main objective of Cyber Security?)
Down
  1. 1. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the______
  2. 3. (main objective of Cyber Security?)
  3. 4. world’s very first antivirus program?
  4. 7. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?
  5. 8. Which one usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
  6. 10. the hackers who's main motive is to gain financial profit by doing cyber crimes.
  7. 11. DNS would translate any Domain name into ___________.
  8. 13. (main objective of Cyber Security?)