Network and Security

123456789101112131415161718
Across
  1. 2. A secret word or phrase that is used to access a computer system or service.
  2. 4. Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
  3. 5. Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
  4. 8. Code that is embedded into the hardware of a computer.
  5. 9. The programs and other operating systems used by a computer.
  6. 10. A cyber attacker who uses software and social engineering methods to steal data and information.
  7. 11. programs that automatically execute tasks as ordered by creator
  8. 12. form of cryptocurrency
  9. 13. Stands for the National Security Agency
  10. 14. The method of obtaining user information through fraudulent communications targeted directly at people.
  11. 17. two words. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
  1. 1. A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior
  2. 2. Text that can be read by the human eye
  3. 3. creating a fake identity on social network account
  4. 6. A weakness in a computer system or network that can be exploited by attackers.
  5. 7. any action that makes a computer system vulnerable
  6. 9. An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
  7. 15. Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
  8. 16. Customizable additions to software for extra functionality
  9. 18. an error, flaw, failure, or fault