Cyber Security
Across
- 2. bits of code embedded in programs by the programer (s) to quickly gain access at a later time.
- 5. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- 7. someone who seeks and exploits weaknesses in a computer system or computer network.
- 8. written errors in someone's code or program.
Down
- 1. If lots of infected systems combine to form a network it is called botnet.
- 3. a type of social engineering where a hacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the hacker.
- 4. any technology, such as tracking software, that aids in gathering information about the person or organization without their knowledge.
- 6. Unlike a computer virus, it does not need to attach itself to an existing program.