Cyber Security
Across
- 1. Network of infected computers controlled remotely
- 3. Software that blocks unauthorized access
- 5. Disguised malicious program
- 8. Self-replicating malicious program
- 13. Verification of identity
- 15. Unauthorized access to data
- 16. A scam to steal sensitive information via email
- 18. Tool that records keystrokes
- 19. Secret combination of characters used for access
- 20. Malicious software that spreads across systems
Down
- 2. Code that takes advantage of a system weakness
- 4. Malware that demands money to restore access
- 6. Attack targeting computer systems
- 7. Software that secretly monitors activity
- 9. Program designed to detect malicious software
- 10. Software update fixing security vulnerabilities
- 11. Malicious software designed to self-replicate
- 12. Process of converting data into a coded form
- 14. Secure private connection over the Internet
- 17. Someone who breaks into computer systems