Cyber security

12345678910111213
Across
  1. 3. infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online
  2. 7. when human users of a system are tricked into providing confidential information
  3. 9. software that automatically checks for available updates
  4. 11. software that scans any file that is able to execute code
  5. 12. large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system
  6. 13. unwanted software that monitors and gathers information
Down
  1. 1. Trojans, spyware, adware, and worms are all examples of this
  2. 2. these replicate themselves but do not attach themselves to files as a virus does
  3. 4. locks a computer, encrypts files, and therefore prevents the user from being able to access the data
  4. 5. malicious form of self-replicating software
  5. 6. checks incoming and outgoing network traffic
  6. 8. piece of software that appears to perform a useful function
  7. 10. automated programs that perform tasks repeatedly