Security Crossword
Across
- 4. - Software that is specifically designed to disrupt, damage, or gain unauthorized access to computer systems.
- 6. - A vulnerability in software that is unknown to the vendor and can be exploited by hackers.
- 12. - A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 14. - The process of converting an input (or 'message') into a fixed-length string of characters, which is typically a hash code.
- 16. - The process of verifying the identity of a user or process.
- 17. - A network of private computers infected with malicious software and controlled as a group.
- 18. - A method of trying to gather personal information using deceptive e-mails and websites.
- 20. - A type of malware that is often disguised as legitimate software.
Down
- 1. - A method of bypassing normal authentication to secure unauthorized remote access to a computer.
- 2. - A network security system that monitors and controls incoming and outgoing network traffic.
- 3. - A type of surveillance software that has the capability to record every keystroke you make.
- 5. - The process of converting information or data into a code to prevent unauthorized access.
- 7. - A collection of software tools that enable unauthorized access to a computer or network.
- 8. - Software that enables a user to obtain covert information about another's computer activities.
- 9. - Virtual Private Network, a service that encrypts your internet traffic and protects your online identity.
- 10. - A security mechanism for separating running programs to reduce system failures or software vulnerabilities.
- 11. - Distributed Denial of Service, an attack meant to shut down a machine or network, making it inaccessible.
- 13. - A piece of software designed to update or fix problems with a computer program or its supporting data.
- 15. - Software designed to detect and destroy computer viruses.
- 19. - Unauthorized access to a computer system or network.