Cyber security
Across
- 4. A separate program or a feature incorporated within a browser that stops popup advertisements from appearing
- 6. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action
- 8. A malware payload that allows an attacker to execute virtually any command on the victim's computer
- 10. Malware that prevents a user's device from properly operating until a fee is paid
- 12. Software code that gives access to a program or service that circumvents normal security protections.
- 14. A logical computer network of zombies under the control of an attacker
- 16. An attacker that sends unsolicited messages to Bluetooth-enable deceives
- 17. Software that helps prevent computers from becoming infected by different types of spyware
- 18. A database of viruses that is used to identify an infected file
- 20. An infected computer that is under the remote control of an attacker
Down
- 1. A general term used to describe software that spies on users by gathering information without consent
- 2. Software that is a cumulative package of all patches and feature updates
- 3. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard
- 5. A publicly released software security update intended to repair a vulnerability
- 7. A copy is files from a computer's hard drive saved on other digital media that is stored in a secure location
- 9. A malicious program designed to enter a computer via a network to take advantage of a vulnerabity in an application or an operating system
- 11. Computer code that lies dormant until it is triggered by specific logical event
- 13. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
- 15. Hardware or software designed to limit the spread of malware
- 19. Removing the built-in limitations and protection google android devices