Cybersecurity
Across
- 2. a system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds
- 4. program that hides in a computer and allows someone from a remote location to take full control of the computer
- 5. a process of encoding messages to keep them secret, so only "authorized" parties can read it.
- 8. malicious software
- 10. The act of securing and protecting individuals, businesses, organizations, and governments that are connected to the Internet and the Web.
- 11. the practice of obtaining something, especially money, through force or threats
- 15. usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
- 16. a technology that allows us to access our files/services through the internet instead of through the storage (hard drive) of our device.
Down
- 1. the programs and other operating information used by a computer.
- 3. hackers use their social skills to trick people into revealing access credentials or other valuable information
- 6. fraudulently ask users to provide sensitive account information by posing as legitimate companies.
- 7. software that collects data about the user and transmits it over the Internet without the user's knowledge or permission
- 9. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- 12. a type of malicious software designed to block access to a computer system until a sum of money is paid.
- 13. Part of a computer system that is designed to block unauthorized access
- 14. a group of two or more computer systems linked together.