Introduction to Cybersecurity

12345678910
Across
  1. 3. COMPUTER PROGRAM THAT, WHEN EXECUTED, REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE.
  2. 5. USING FAKE COMMUNICATION SUCH AS AN EMAIL, TO TRICK THE RECEIVER INTO OPENING IT AND CARRYING OUT THE INSTRUCTIONS INSIDE.
  3. 7. MALICIOUS SOFTWARE.
  4. 9. SOFTWARE THAT AUTOMATICALLY DISPLAYS OR DOWNLOADS ADVERTISING MATERIAL WHEN A USER IS ONLINE.
  5. 10. SPREADS COPIES OF ITSELF FROM COMPUTER TO COMPUTER WITHOUT ANY HUMAN INTERACTION OR DOES NOT NEED TO ATTACH ITSELF TO A SOFTWARE PROGRAM TO CAUSE DAMAGE.
Down
  1. 1. AN ATTACK MEANT TO SHUT DOWN A MACHINE OR NETWORK MAKING IT INACCESSIBLE TO ITS INTENDED USERS.
  2. 2. A NETWORK THAT COVERS A SMALL GEOGRAPHICAL AREA SUCH AS HOMES, OFFICES, AND GROUPS OF BUILDINGS.
  3. 4. SOFTWARE THAT ENABLES A USER TO OBTAIN COVERT INFORMATION ABOUT ANOTHER'S COMPUTER ACTIVITIES.
  4. 6. A NETWORK THAT COVERS LARGER GEOGRAPHICAL AREAS THAT CAN SPAN THE GLOBE
  5. 8. MALICIOUS SOFTWARE DESIGNED TO BLOCK ACCESS TO A COMPUTER SYSTEM UNTIL A SUM OF MONEY IS PAID.