cyber security
Across
- 4. A fake email scam designed to steal personal information.
- 5. Unauthorized access to sensitive systems or data.
- 7. Software or hardware that records everything typed.
- 10. An update that fixes security vulnerabilities in software.
- 13. A network of compromised computers controlled remotely.
- 14. Malware that attaches to files and spreads when they open.
- 16. Malware disguised as legitimate software.
- 18. A vulnerability that hackers exploit before it’s patched.
- 19. General term for malicious software.
Down
- 1. The process of converting data into a secret code.
- 2. Attack that overwhelms a system with massive fake traffic.
- 3. Software that secretly gathers user information.
- 5. Hidden access point into a system left by attackers.
- 6. Malware that hides itself deep in the operating system.
- 8. Code or tool that takes advantage of a vulnerability.
- 9. Login method requiring two forms of authentication.
- 11. One-way process of turning data into a fixed-length string.
- 12. Self-replicating program that spreads without human help.
- 15. Malware that locks files and demands payment.
- 17. Network security system that blocks unauthorized access.