Crosswords Cybersecurity

12345678910
Across
  1. 3. is a set of modifications made to a computer program or its supporting data in order to update, correct, or improve it.
  2. 5. establishes a digital connection between your computer and a remote server belonging to a provider
  3. 7. malicious computer program used to give hackers unauthorized remote access to an infected computer by exploiting system vulnerabilities.
  4. 9. is one of the disciplines concerned with protecting messages (ensuring confidentiality, authenticity and integrity) often using secrets or keys.
  5. 10. It involves copying the magnetic stripes of a bank card using a memory reader
Down
  1. 1. a person who seeks ways to bypass software and hardware protections.
  2. 2. Malicious software that blocks access to the computer or files by encrypting them and demands a ransom payment from the victim to regain access.
  3. 4. Key a string of characters used within an encryption algorithm for altering data so that it appears random
  4. 6. a form of malware or hardware that tracks and records your keystrokes as you type
  5. 8. fraudulent technique that allows fraudsters to display a phone number that is not their own.