Cybersecurity
Across
- 1. An update to fix vulnerabilities or bugs in software.
- 5. Software designed to detect and remove malicious software or viruses.
- 9. An isolated environment for testing or executing suspicious code safely.
- 11. Permission to enter or use a computer system or network.
- 15. When a system or device is not actively being used, often exploited in attacks like botnets.
- 17. Software or hardware used to record keystrokes on a computer, often for malicious purposes.
- 18. A copy of data stored separately to recover in case of loss or corruption.
- 19. A digital profile used to access systems, often with a username and password.
- 22. A scam to steal sensitive information by pretending to be a trustworthy entity.
- 23. A software program that performs automated tasks, often maliciously.
- 24. A type of malware designed to gain unauthorized access and hide its presence.
Down
- 2. Software that automatically displays or downloads advertisements.
- 3. An incident where unauthorized access to data or systems occurs.
- 4. A group of computers infected with malware and controlled as a network.
- 6. A weakness in a system that can be exploited to cause harm or unauthorized access.
- 7. Any software designed to damage, disrupt, or gain unauthorized access to a system.
- 8. Malicious software that replicates itself and spreads independently across networks.
- 10. A group of connected computers or devices that share resources.
- 12. Malware that secretly collects information about a user or system.
- 13. Malicious software that pretends to be legitimate to trick users into running it.
- 14. A hacker who uses their skills for political activism or protest.
- 16. Any event or occurrence that can affect the security or integrity of a system.
- 20. A technique used to deceive others by falsifying identity or data.
- 21. Malicious code that replicates itself and spreads to other systems.