cybersecurity

12345678910111213141516171819
Across
  1. 2. is unwanted software designed to throw advertisements up on your screen, most often within a web browser
  2. 3. is a collection of updates and fixes, called patches, for an operating system or a software program.
  3. 6. is a type of malware that downloads onto a computer disguised as a legitimate program.
  4. 11. is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  5. 12. is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
  6. 13. often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard
  7. 14. is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
  8. 15. is the practice of copying data from a primary to a secondary location, to protect it in case of a disaster, accident or malicious action
  9. 16. is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  10. 19. is a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks.
Down
  1. 1. is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user
  2. 2. designed to detect and destroy computer viruses
  3. 4. is caused by software or hardware errors.
  4. 5. is a set of changes to a computer program or its supporting data designed to update, fix, or improve
  5. 7. malicious software bundle designed to give unauthorized access to a computer or other software
  6. 8. is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
  7. 9. is a type of malware from cryptovirology that threatens to publish the victim's personal data unless the ransom is paid
  8. 10. is any program that prohibits a pop-up at some point in time.
  9. 17. is a computer connected to a network that has been compromised by a hacker, a virus or a Trojan.
  10. 18. a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.