Cybersecurity 2.2
Across
- 2. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data
- 5. Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running
- 7. A file that contains an official record of activities that occur on a computer
- 8. software that replicates and infects many computers, turning the computer into a "zombie"
- 9. Reverse the encryption process, making the data human-readable again
Down
- 1. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet
- 3. Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information
- 4. Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc
- 6. Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it