Cybersecurity

123456789101112131415161718192021222324
Across
  1. 1. An update to fix vulnerabilities or bugs in software.
  2. 5. Software designed to detect and remove malicious software or viruses.
  3. 9. An isolated environment for testing or executing suspicious code safely.
  4. 11. Permission to enter or use a computer system or network.
  5. 15. When a system or device is not actively being used, often exploited in attacks like botnets.
  6. 17. Software or hardware used to record keystrokes on a computer, often for malicious purposes.
  7. 18. A copy of data stored separately to recover in case of loss or corruption.
  8. 19. A digital profile used to access systems, often with a username and password.
  9. 22. A scam to steal sensitive information by pretending to be a trustworthy entity.
  10. 23. A software program that performs automated tasks, often maliciously.
  11. 24. A type of malware designed to gain unauthorized access and hide its presence.
Down
  1. 2. Software that automatically displays or downloads advertisements.
  2. 3. An incident where unauthorized access to data or systems occurs.
  3. 4. A group of computers infected with malware and controlled as a network.
  4. 6. A weakness in a system that can be exploited to cause harm or unauthorized access.
  5. 7. Any software designed to damage, disrupt, or gain unauthorized access to a system.
  6. 8. Malicious software that replicates itself and spreads independently across networks.
  7. 10. A group of connected computers or devices that share resources.
  8. 12. Malware that secretly collects information about a user or system.
  9. 13. Malicious software that pretends to be legitimate to trick users into running it.
  10. 14. A hacker who uses their skills for political activism or protest.
  11. 16. Any event or occurrence that can affect the security or integrity of a system.
  12. 20. A technique used to deceive others by falsifying identity or data.
  13. 21. Malicious code that replicates itself and spreads to other systems.