cyber security

123456789101112
Across
  1. 3. person who finds and exploits the weakness in computer systems.
  2. 5. process of finding weakness in computer or private networks.
  3. 6. comprises a collection of internet-connected computers and devices that are infected and controlled remotely by cybercriminals.
  4. 8. designed to disrupt, damaged, or gain unauthorized access to a computer system.
  5. 10. exploits vulnerabilities on the device to encrypt important files.
  6. 12. an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
Down
  1. 1. used to obtained sensitive information from users.
  2. 2. that downloads onto a computer disguised as a legitimate program.
  3. 4. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  4. 7. a secret word or phrase that must be used to gain admission to a place.
  5. 9. malicious software.
  6. 11. monitors the victim's internet activity, tracks login credentials and spies on sensitive information.