Cybersecurity
Across
- 2. who interferes with normal computer functions
- 6. records or transmits a user's keystrokes
- 8. writing computer software code
- 9. client-side code injection attack
- 10. refers to any external entity who may have access to private data
- 11. gain unauthorized access to a computer system
- 13. network of maliciously installed bots
- 15. destroying a hardware by delivering a high-voltage electrical surge
- 16. cyber exploit directed at online card players
- 17. security risk who cause the program to crash
- 18. software tools used by a third party
Down
- 1. unauthorized duplication or deletion of an organization's electronic information
- 3. secure time-limited credential
- 4. attack that originates from many different sources
- 5. capable of being easily hurt
- 7. designed to take advantage of a particular error
- 12. possible source of harm
- 14. security mechanism for separating running programs