Cybersecurity
Across
- 2. A group of interconnected computers that share resources and information.
- 3. Malicious code that replicates itself by modifying other computer programs.
- 4. A hidden method for bypassing normal authentication in a computer system.
- 6. Software that secretly collects user information without their knowledge.
- 8. A network security device that monitors and filters incoming and outgoing network traffic.
- 9. Distributed Denial of Service, an attack that overwhelms a network with traffic.
- 10. A technique used to trick users into providing sensitive information by pretending to be a trustworthy entity.
- 12. A vulnerability that is exploited before the software developer is aware.
- 13. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- 14. Software that displays unwanted advertisements on a user’s device.
- 16. Personally Identifiable Information, data that can identify an individual.
- 17. Malicious software disguised as legitimate software to deceive users.
Down
- 1. The process of converting information into code to prevent unauthorized access.
- 5. A program that records every keystroke made by a user.
- 7. Malware that encrypts files, demanding ransom payment for decryption keys.
- 11. Unauthorized entry into a computer system or network.
- 15. A set of tools that enables unauthorized access to a computer while hiding its presence.