Cyber Security

123456789101112131415161718192021222324252627
Across
  1. 3. Software designed to block malware from entering protected networks.
  2. 7. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  3. 8. a program that records every key struck on a keyboard and sends that information to an attacker.
  4. 10. A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical
  5. 12. The amount of data that can pass through a network or part of a network per second.
  6. 14. Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
  7. 15. software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
  8. 16. or identity theft.
  9. 17. until it is decrypted using a secret key.
  10. 18. unsolicited emails sent to many addresses. The purpose of most spam is to make money through
  11. 22. a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
  12. 23. Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  13. 25. The process of using codes to make readable information unreadable. Encrypted information cannot be
  14. 26. a data storage device that is used to store, back up, and transfer computer files.
  15. 27. a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
Down
  1. 1. consists of code written in a programming language that instructs computers to perform specific tasks.
  2. 2. Extra copies of computer files that can be used to restore files that are lost or damaged.
  3. 4. Two or more interconnected devices that can exchange data.
  4. 5. a computer or computer program that provides specific services on a network, such as an email server
  5. 6. port a type of connection between devices that can exchange information and power supply.
  6. 9. a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
  7. 11. Computer programs that can block, detect, and remove viruses and other malware.
  8. 13. A company or organization that gives users and devices access to the Internet.
  9. 19. attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
  10. 20. programs.
  11. 21. directs emails and a web server that serves up web pages.
  12. 24. A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.