Cyber Keywords

123456789101112131415161718
Across
  1. 2. Computer code that lies dormant until it is triggered by a specific logical event.
  2. 5. Malware that prevents a user's device from properly operating until a fee is paid
  3. 7. A general term used to describe software that spies on users by gathering information without consent
  4. 8. Enhancements to the software to provide new or expanded functionality, but do not address security vulnerabilities.
  5. 9. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
  6. 12. software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus
  7. 14. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
  8. 15. A separate program or a feature incorporated within a browser that stops popup advertisements from appearing.
  9. 17. A logical computer network of zombies under the control of an attacker
  10. 18. Software code that gives access to a program or a service that circumvents normal security protections.
Down
  1. 1. Software that is a cumulative package of all patches and feature updates.
  2. 3. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
  3. 4. A database of viruses that is used to identify an infected file
  4. 6. A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
  5. 8. Hardware or software designed to limit the spread of malware.
  6. 10. A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
  7. 11. An attacker who controls a botnet.
  8. 13. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
  9. 15. A publicly released software security update intended to repair a vulnerability.
  10. 16. An infected computer that is under the remote control of an attacker.