Cyber Security
Across
- 3. Software designed to block malware from entering protected networks.
- 7. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- 8. a program that records every key struck on a keyboard and sends that information to an attacker.
- 10. A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical
- 12. The amount of data that can pass through a network or part of a network per second.
- 14. Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
- 15. software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
- 16. or identity theft.
- 17. until it is decrypted using a secret key.
- 18. unsolicited emails sent to many addresses. The purpose of most spam is to make money through
- 22. a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
- 23. Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
- 25. The process of using codes to make readable information unreadable. Encrypted information cannot be
- 26. a data storage device that is used to store, back up, and transfer computer files.
- 27. a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
Down
- 1. consists of code written in a programming language that instructs computers to perform specific tasks.
- 2. Extra copies of computer files that can be used to restore files that are lost or damaged.
- 4. Two or more interconnected devices that can exchange data.
- 5. a computer or computer program that provides specific services on a network, such as an email server
- 6. port a type of connection between devices that can exchange information and power supply.
- 9. a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
- 11. Computer programs that can block, detect, and remove viruses and other malware.
- 13. A company or organization that gives users and devices access to the Internet.
- 19. attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
- 20. programs.
- 21. directs emails and a web server that serves up web pages.
- 24. A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.