Computer Virus

12345678910111213141516171819
Across
  1. 5. - An attempt to acquire sensitive information by posing as a trustworthy entity.
  2. 7. - The act of securing data by converting it into a code.
  3. 9. - Software that collects personal information without consent.
  4. 10. - Process of a system being affected by malware.
  5. 12. - Software intended to harm a computer or user.
  6. 15. - Making copies of data to prevent loss.
  7. 16. - Place where infected files are held to prevent harm.
  8. 17. - Type of malware that encrypts files, demanding payment for their release.
  9. 19. - Malicious software designed to damage or disrupt systems.
Down
  1. 1. - The state of being guarded against malware and cyber threats.
  2. 2. - A program that detects, prevents, and removes malicious software.
  3. 3. - Potential source of harm to a computer system.
  4. 4. - A security system that controls incoming and outgoing network traffic.
  5. 6. - Unauthorized intrusion into a computer or network.
  6. 8. - Practices to defend computers from digital threats.
  7. 9. - The process of analyzing a computer to detect malware.
  8. 11. - Program that seems legitimate but is used to deceive users and cause harm.
  9. 13. - Process of installing the latest security patches and software fixes.
  10. 14. - Unwanted software designed to throw advertisements.
  11. 18. - A self-replicating program that spreads without human intervention.