Cyber Security
Across
- 6. the process of converting information or data into a code, especially to prevent unauthorized access
- 8. A software designed to detect and destroy computer viruses
- 9. A network of private computers infected with malicious software and controlled as a group without the owners knowledge
- 10. A unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission
- 11. A software that enables a user to obtain covert information about another computer
- 12. Theft the fraudulent practice of using another person's name and personal information in order to obtain credits and loans
- 14. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- 15. A standalone malware computer program that replicates itself in order to spread to other computers
- 16. A person who uses computers to gain unauthorized access to data
Down
- 1. A software which is specifically designed to disrupt, damage, or gain authorized access to a computer system
- 2. A program designed to breach the security of a computer system while ostensibly performing some innocuous function
- 3. A Computer security also known as cyber security or IT security of computer systems from the theft or damage to their hardware
- 4. A attempt by hackers to damage or destroy a computer network or system
- 5. A type of malicious software designed to block access to a computer system until a sum of money is paid
- 7. A vulnerability of an organization's internal resources that arises from the organization using the Internet to conduct business
- 13. A statement of an intention to inflict pain, injury, damage, or other hostile action on someone in retribution for something done or not done