Data Confidentiality - Day 02
Across
- 2. An infected computer which is controlled by an attacker
- 4. Prevents malware from entering a computer
- 6. Security update intended to cover vulnerabilities
- 7. Is an external device used for backups
- 9. Displays a fictitious warning
Down
- 1. Captures key strokes
- 3. Runs on a computer without the owner's knowledge
- 5. Sends itself to other computers over the network
- 8. Gives access to a program or service while bypassing normal security measures
- 10. Delivers advertising content