All Things Cybersecurity

12345678910
Across
  1. 3. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  2. 5. Small files that Web sites put on your computer hard disk drive when you first visit.
  3. 9. Algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
  4. 10. Someone who seeks and exploits weaknesses in a computer system or computer network.
Down
  1. 1. A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  2. 2. The process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
  3. 4. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  4. 6. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  5. 7. An attempt by hackers to damage or destroy a computer network or system.
  6. 8. A local or restricted communications network, especially a private network created using World Wide Web software.