cyber security

12345678910
Across
  1. 4. technique used by hackers to obtain sensitive information.
  2. 5. set of programs that tell a computer to perform a task.
  3. 7. defensive technology designed to keep the bad guys out
  4. 8. group of computers, printers and devices that are interconnected and governed as a whole. --
  5. 9. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  6. 10. malicious application or script that can be used to take advantage of a computer’s vulnerability.
Down
  1. 1. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  2. 2. type of malware that functions by spying on user activity without their knowledge.
  3. 3. process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  4. 6. that allows us to access our files and/or services through the internet from anywhere in the world.