Across
- 3. the fraudulent practice of sending emails or other messages in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 7. security method that scrambles data so it is only read by using a key
- 8. a piece of software used for scanning, detecting, blocking and preventing malicious programs from accessing our system
- 10. a malicious attempt to disrupt or shut down the normal functioning of a targeted server, service, or network
- 11. any software program in which advertising banners are displayed while the program is running
- 12. hijacked computers and devices infected with bot malware and remotely controlled by a hacker
Down
- 1. it analyzes incoming traffic based on pre-established rules and filter traffic coming from unsecured or suspicious sources to prevent attacks
- 2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
- 4. someone who seeks and exploits weaknesses in a computer system or computer network
- 5. a standalone malware computer program that replicates itself in order to spread to other computers
- 6. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- 9. a type of malware that downloads onto a computer disguised as a legitimate program
