Cyber Basics & Common Threats
Across
- 3. Software designed to harm or exploit a system
- 4. Network of infected computers controlled remotely
- 7. Malware that locks data and demands payment
- 10. Software that secretly collects user data
- 11. Process of converting information into code
- 13. Software update to fix vulnerabilities
- 14. Malware designed to hide other malicious software
Down
- 1. A secret string of characters used for authentication
- 2. Self-replicating malicious program
- 5. Malicious software disguised as legitimate
- 6. A security barrier between trusted and untrusted networks
- 8. Taking advantage of a vulnerability
- 9. Hidden entry point into a system
- 12. Software that detects and removes malicious code
- 13. Fraudulent attempt to steal sensitive data via fake email