Security Terms

1234567891011121314151617181920
Across
  1. 5. Copy of files from computer hard drive saved on other digital media that is stored in a secure location
  2. 8. Set of software tools used by attackers to hide the presence of other malicious softwares
  3. 9. Logical computer network of zombies under control of an attacker
  4. 12. Attacker who controls a botnet
  5. 17. Database of viruses used to identify infected files
  6. 18. Computer code that is dormant until it is triggered by a specific logical event
  7. 19. General term used to describe software that spies on users by gathering information without consent
Down
  1. 1. Program or feature incorporated in a browser that stops popup advertisements from appearing
  2. 2. Enhancements to software to provide expanded functionality, but do not address vulnerabilities
  3. 3. Software that is a cumulative package of all patches and feature updates
  4. 4. Malware preventing devices from properly operating until a fee is paid
  5. 6. Software that helps prevent computers from becoming infected by spyware
  6. 7. Infected computer under remote control of an attacker
  7. 10. Malicious computer code that reproduces itself on a computer
  8. 11. Software of hardware device that captures each keystroke that is typed on the computer's keyboard
  9. 13. Hardware or software designed to limit spread of malware
  10. 14. Software code that gives access to a program that circumvents normal security protections
  11. 15. Publicly released software security update to repair a vulnerability
  12. 16. Malicious program designed to enter a computer via a network to take advantage of vulnerabilities
  13. 20. Security program that delivers advertising content in a way that is unexpected and unwanted