cybersecurity

1234567891011121314151617181920212223242526
Across
  1. 3. a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
  2. 5. Likes to chase mice
  3. 7. is a type of malware from cryptovirology that threatens to publish the victim's personal data unless the ransom is paid
  4. 8. game that teaches you about viruses
  5. 9. is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
  6. 11. often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard
  7. 15. is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  8. 17. is a collection of updates and fixes, called patches, for an operating system or a software program.
  9. 19. is a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks.
  10. 21. designed to detect and destroy computer viruses
  11. 22. Flying mammal
  12. 24. malicious software bundle designed to give unauthorized access to a computer or other software
  13. 25. is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
  14. 26. Large marsupial
Down
  1. 1. is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  2. 2. is a type of malware that downloads onto a computer disguised as a legitimate program.
  3. 4. is a computer connected to a network that has been compromised by a hacker, a virus or a Trojan.
  4. 6. is caused by software or hardware errors.
  5. 10. is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
  6. 12. is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user
  7. 13. is any program that prohibits a pop-up at some point in time.
  8. 14. Man's best friend
  9. 16. is the practice of copying data from a primary to a secondary location, to protect it in case of a disaster, accident or malicious action
  10. 18. is unwanted software designed to throw advertisements up on your screen, most often within a web browser
  11. 20. Has a trunk
  12. 23. is a set of changes to a computer program or its supporting data designed to update, fix, or improve