Cyber security

123456789101112131415
Across
  1. 4. In order to ensure the security of the data/information, we need to ____________ the data:
  2. 5. _______ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
  3. 6. _______ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  4. 9. ______ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
  5. 11. ________is actually considered the first computer virus?
  6. 13. ________ is when attackers send malicious emails designed to trick people into falling for a scam.
  7. 14. ______is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
  1. 1. __________is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  2. 2. Advertising software can be used to spread malware.
  3. 3. _______ is a program that secretly records what a user does so that cybercriminals can make use of this information.
  4. 7. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
  5. 8. _______ is a type of software designed to help the user's computer detect viruses and avoid them.
  6. 10. _______ is a type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computers where they cause damage or collect data.
  7. 12. _______ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
  8. 15. Which wifi cummunication protocol is more Secure?