Cyber Hackers & Cybersecurity

12345678910111213141516
Across
  1. 3. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. 7. An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner
  3. 11. A form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
  4. 13. Type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
  5. 14. Software designed to detect and destroy computer viruses
  6. 15. Interconnected computing devices that can exchange data and share resources with each other
  7. 16. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
  1. 1. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  2. 2. The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers
  3. 4. It involves using computers, the internet, and other digital technologies to attack or defend against computer systems, networks, and infrastructure attacks
  4. 5. Creation of a false identity by a cybercriminal with the intention of defrauding a victim
  5. 6. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  6. 8. Software that automatically displays or downloads advertising material (often unwanted) when a user is online
  7. 9. Group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses
  8. 10. Baiting a trap for hackers
  9. 12. The process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. Jailbreaking allows the device owner to gain full access to th