Cybersecurity Terms
Across
- 2. Multiple infected computers controlled remotely.
- 6. Amount of data that can pass through a network per second.
- 9. Disrupts services for political or social reasons.
- 10. Program that can copy itself and cause harm.
- 12. Consists of code instructing computers.
- 16. Connection between devices for information exchange.
- 18. Provides users and devices access to the Internet.
- 19. Data storage device for files.
- 20. Records keystrokes and sends them to an attacker.
- 22. Updates computer programs to fix vulnerabilities.
- 23. Software blocking malware from entering networks.
Down
- 1. Computer programs that block, detect, and remove viruses and malware.
- 3. Flaw in a program hackers exploit.
- 4. Provides specific services on a network.
- 5. Attempts to trick people into revealing sensitive information.
- 7. Fictional virus damaging physical infrastructure.
- 8. Harmful software including viruses and worms.
- 11. Process of making information unreadable.
- 13. Interconnected devices exchanging data.
- 14. Attempt to overwhelm online services with traffic.
- 15. Holds computer files hostage for ransom.
- 17. Unsolicited emails sent to many addresses.
- 21. Extra copies of files for restoring lost or damaged data.