Across
- 2. Vulnerability is a ---------- which allows an attacker to reduce a system’s information assurance.
- 5. If you encounter a ransomware attack, the first thing you should do is pay the ransom. True or False?
- 6. a type of software designed to help the user's computer detect viruses and avoid them.
- 9. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware.
- 12. (main objective of Cyber Security?)
Down
- 1. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the______
- 3. (main objective of Cyber Security?)
- 4. world’s very first antivirus program?
- 7. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?
- 8. Which one usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
- 10. the hackers who's main motive is to gain financial profit by doing cyber crimes.
- 11. DNS would translate any Domain name into ___________.
- 13. (main objective of Cyber Security?)
