IT Security

12345678910
Across
  1. 1. password manager mentioned in presentation
  2. 3. standalone malware computer program that replicates itself in order to spread to other computers
  3. 5. network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  4. 7. nickname of person who stolen Morele.net database
  5. 8. a good hacker
  6. 10. a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Down
  1. 2. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information
  2. 4. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. 6. fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication
  4. 9. a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.