Cyber Security

123456789101112131415161718192021222324
Across
  1. 5. or identity theft.
  2. 8. A company or organization that gives users and devices access to the Internet
  3. 10. often by using emails or fake websites that look like they are from trusted organizations.
  4. 11. Someone who uses computers and computer networks to disrupt services or share secret information in
  5. 13. Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
  6. 16. until it is decrypted using a secret key
  7. 18. Consists of code written in a programming language that instructs computers to perform specific tasks.
  8. 21. computers are usually used to cause damage that couldn’t be achieved with a single computer
  9. 24. Multiple computers on a network that are infected with a program that can be controlled remotely. The
Down
  1. 1. The process of using codes to make readable information unreadable. Encrypted information cannot be
  2. 2. Attempting to trick people into revealing sensitive information, such as passwords and credit card
  3. 3. A type of malware that holds victims’ computer files hostage by locking access to them or encrypting
  4. 4. Extra copies of computer files that can be used to restore files that are lost or damaged
  5. 6. A distributed denial of service attack attempts to make an online service, like a website, unavailable by
  6. 7. software Computer programs that can block, detect, and remove viruses and other malware
  7. 9. A computer or computer program that provides specific services on a network, such as an email server
  8. 12. It then demands a ransom if the victim wants his or her files back.
  9. 14. Unsolicited emails sent to many addresses. The purpose of most spam is to make money through
  10. 15. it with a flood of traffic from a team of computers.
  11. 17. effort to draw attention to political or social issues.
  12. 19. directs emails and a web server that serves up web pages.
  13. 20. Software designed to block malware from entering protected networks
  14. 22. programs.
  15. 23. A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical
  16. 24. The amount of data that can pass through a network or part of a network per second