cyber security
Across
- 2. set of programs that tell a computer to perform a task.
- 3. moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- 7. defensive technology designed to keep the bad guys out
- 8. technique used by hackers to obtain sensitive information.
- 9. malicious application or script that can be used to take advantage of a computer’s vulnerability.
Down
- 1. that allows us to access our files and/or services through the internet from anywhere in the world.
- 2. type of malware that functions by spying on user activity without their knowledge.
- 4. process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- 5. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
- 6. group of computers, printers and devices that are interconnected and governed as a whole. --