Across
- 3. A client computer program that can retrieve and display information from servers on the World Wide Web.
- 5. A way to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
- 8. A network of computers infected by malware that are controled by a single attacker.
- 10. The encrypted text transformed from plaintext using an encryption algorithm.
- 11. Cyber Attack in which hackers use the computing power of a compromised device to mine cryptocurrency.
- 12. The process of decoding cipher text to plain text so that it is readable by humans.
Down
- 1. A software which bombards users with endless malicious ads and pop-up windows or redirect to other website
- 2. A malware that uses scare tactics, often in the form of pop-ups, to trick users into visiting malware-containing websites.
- 4. A collection of malicious software tools that allow hackers to remotely access and control a computer or network.
- 6. A controlled and safe environment set up as a decoy/trap to lure cyber attackers & study their hacking attempts
- 7. A computer malware that can reproduce itself and spreads copies to other computers in the network.
- 9. A piece of data from the website you visited, stored within the web browser that the website can retrieve at a later time.
