cybersecurity
Across
- 2. an interruption in authorized users access to a computer network, typically one caused with malicious intent
- 4. an exchange of keys where the parties involved are not authenticated, meaning fraud can happen.
- 6. A form of denial of service attack desgined to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system
- 8. software that generates revenue by throwing ads up on your screen
- 9. a software or hardware tool that allows the user to monitor your internet traffic
- 10. a situation in which a person or program successfully identifies itself as another by falsifying data
- 11. a computer that is connected to the internet and taken over by a computer worm, virus, or other malware
- 12. malicious software designed to steal data and harm or destroy computers.
- 13. occurs when multiple machines are operating together to attack one target
Down
- 1. a malfunction of a hardware or a software component
- 3. A computer virus written in the same type of macro language as things like excel or word
- 5. ethical hacking
- 7. a type of malware that infects your computer and harms its master boot partition
- 10. any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- 12. average time between repairable failures of a technology product