CYBERSECURITY
Across
- 4. information
- 5. software that is secretly installed into a system
- 9. capability to limit network traffic between networks
- 11. measures to reduce the likelihood of an unwanted occurence
- 12. software that tracks keystrokes and keyboard events
Down
- 1. the abuse of email to send unsolicited bulk messages
- 2. a person who breaks into a computer or network
- 3. a program that can infect a computer and spread to another computer
- 6. a string of characters used to verify access authorization
- 7. the process of transforming plaintext into cipher text
- 8. software that compromises the operation of a system
- 10. self replicating program that uses networking mechanisms to spread itself