Across
- 2. Malware that can replicate itself in order to spread the infection to other connected computers.
- 4. The past tense of when a bad actor gained unauthorized access to a system.
- 5. Software which protects systems from malware like Trojans, viruses, worms, spyware, and more.
- 6. Malware that prevents you from accessing files on your computer by holding your data hostage.
- 7. Practice of sending emails to trick users into revealing personal information.
- 9. A defensive technology, that acts as a virtual or physical barrier, designed to keep unauthorized users off networks.
- 10. Malicious software that allows a hacker to gain remote access to a computer through a “back door”.
Down
- 1. A group of computers, printers and devices that are interconnected and governed as a whole.
- 3. An access method that enables access to a private network over a public network such as the Internet.
- 8. Malicious software that disrupts a system or allows a bad actor to gain access to a system.
