Networks threats

123456789101112
Across
  1. 3. the fraudulent practice of sending emails or other messages in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  2. 7. security method that scrambles data so it is only read by using a key
  3. 8. a piece of software used for scanning, detecting, blocking and preventing malicious programs from accessing our system
  4. 10. a malicious attempt to disrupt or shut down the normal functioning of a targeted server, service, or network
  5. 11. any software program in which advertising banners are displayed while the program is running
  6. 12. hijacked computers and devices infected with bot malware and remotely controlled by a hacker
Down
  1. 1. it analyzes incoming traffic based on pre-established rules and filter traffic coming from unsecured or suspicious sources to prevent attacks
  2. 2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
  3. 4. someone who seeks and exploits weaknesses in a computer system or computer network
  4. 5. a standalone malware computer program that replicates itself in order to spread to other computers
  5. 6. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  6. 9. a type of malware that downloads onto a computer disguised as a legitimate program