Across
- 2. : Compromised computer used in a botnet.
- 4. : Blocks unauthorized network access.
- 8. : Common way for malware to spread via email.
- 9. : Device that guards against electrical surges.
- 11. : Actions to return to full processing capability.
- 12. : Using digital tools to harass or threaten others.
- 16. : Setting to control macro behavior in software.
- 21. : Prolonged malfunction of a computer.
- 22. : Online behavior rules and manners.
- 24. : Plan to restore operations after a disaster.
- 25. : How you're represented online to others.
- 26. : Malware disguised as a legitimate program.
- 27. : Software that detects and removes malware.
- 29. : Legal protection for original digital content.
Down
- 1. : Unique code used to identify a virus.
- 3. : An event that could damage computer hardware or data.
- 5. : How backup files are used to resume operations.
- 6. : Group of infected computers controlled remotely.
- 7. : Portable storage that should be scanned before use.
- 10. : Malware that copies itself and drains system resources.
- 13. : Immediate steps taken after a disaster.
- 14. : Any illegal act involving a computer or device.
- 15. : Internet-based illegal activity.
- 17. : Provides backup power during outages.
- 18. : Program that damages computers and spreads.
- 19. : License that allows sharing with conditions.
- 20. : Hidden method to bypass system security.
- 23. : Larger version of a denial-of-service attack.
- 24. : Attack that disrupts access to online services.
- 28. : Simulates disaster to test recovery ability.
