Unit 11 crossword
Across
- 2. Standalone malicious programs that self-replicate and spread across networks.
- 4. Malicious code that attaches to legitimate programs and spreads.
- 6. Scrambling data to make it unreadable without a key.
- 7. Software that secretly monitors and collects information about a user.
- 8. An attacker secretly intercepting communication between two parties.
- 9. Any software designed to harm or exploit a computer system.
- 11. : A hacker who finds vulnerabilities without permission but usually reports them.
- 14. :Manipulating people to gain access to information or systems.
Down
- 1. : A malicious hacker who breaks into systems illegally for personal gain or damage.
- 2. : An ethical hacker who finds vulnerabilities with permission.
- 3. attack: Malicious software that blocks access to data until a fee is paid.
- 5. Tricking people into revealing sensitive information, often via fake emails.
- 10. : A novice hacker, often trying to learn and gain recognition.
- 12. : Hackers who aggressively shut down black hat hackers (e.g., vigilantes).
- 13. Malicious programs disguised as legitimate software to gain access