Introduction to Cybersecurity

12345678910
Across
  1. 1. SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
  2. 4. USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
  3. 5. A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
  4. 6. SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
  5. 9. MALICIOUS SOFTWARE.
Down
  1. 2. AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
  2. 3. MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.
  3. 7. SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
  4. 8. COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
  5. 10. A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.