Security Terms
Across
- 5. Copy of files from computer hard drive saved on other digital media that is stored in a secure location
- 8. Set of software tools used by attackers to hide the presence of other malicious softwares
- 9. Logical computer network of zombies under control of an attacker
- 12. Attacker who controls a botnet
- 17. Database of viruses used to identify infected files
- 18. Computer code that is dormant until it is triggered by a specific logical event
- 19. General term used to describe software that spies on users by gathering information without consent
Down
- 1. Program or feature incorporated in a browser that stops popup advertisements from appearing
- 2. Enhancements to software to provide expanded functionality, but do not address vulnerabilities
- 3. Software that is a cumulative package of all patches and feature updates
- 4. Malware preventing devices from properly operating until a fee is paid
- 6. Software that helps prevent computers from becoming infected by spyware
- 7. Infected computer under remote control of an attacker
- 10. Malicious computer code that reproduces itself on a computer
- 11. Software of hardware device that captures each keystroke that is typed on the computer's keyboard
- 13. Hardware or software designed to limit spread of malware
- 14. Software code that gives access to a program that circumvents normal security protections
- 15. Publicly released software security update to repair a vulnerability
- 16. Malicious program designed to enter a computer via a network to take advantage of vulnerabilities
- 20. Security program that delivers advertising content in a way that is unexpected and unwanted