CROSSWORD-1

12345678910
Across
  1. 2. a method, often secret, of bypassing normal authentication in a product
  2. 5. any software program in which advertising banners are displayed while the program is running
  3. 7. any malicious computer program which is used to hack into a computer by misleading users of its true intent
  4. 8. A phone call tactic in which individuals are tricked into revealing critical financial or personal information
  5. 9. a standalone malware computer program that replicates itself in order to spread to other computers.
  6. 10. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
Down
  1. 1. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  2. 3. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  3. 4. are small files that Web sites put on your computer hard disk drive when you first visit
  4. 6. used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.