Across
- 1. Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems
- 5. standalone malware computer program that replicates itself in order to spread to other computers.
- 6. messages distributed by electronic means from one computer user to one or more recipients via a network.
- 9. the programs and other operating information used by a computer.
- 11. is a weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system.
- 13. is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment.
- 14. a type of malware that is often disguised as legitimate software.
- 15. Browser is a software application for accessing information on the World Wide Web.
Down
- 2. to receive data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar systems
- 3. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 4. is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- 7. Software is a computer program used to prevent, detect, and remove malware.
- 8. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 10. is a memorized secret used to confirm the identity of a user.
- 12. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
