Network Security

123456789
Across
  1. 2. Malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent
  2. 5. The process of protecting information or data by scrambling it so only those with the key can unscramble it
  3. 7. A malicious computer program which is used to hack into a computer by misleading users as to its true intentions. They are often hidden in downloads such as free online computer games
  4. 8. A simple program made to harm a computer system. It spreads by duplicating and attaching itself to files
  5. 9. A tool that monitors traffic going into and out of a computer or network, and either allows the traffic to pass through or blocks it
Down
  1. 1. An attack where a series of a computers repeatedly send requests to a server to overload a system
  2. 3. The process of a user confirming that they are who they say they are on a computer system
  3. 4. Trying to trick someone into giving out information over email
  4. 6. A computer program that makes lots of copies of itself,