Cyber Security

12345678
Across
  1. 2. bits of code embedded in programs by the programer (s) to quickly gain access at a later time.​
  2. 5. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data​
  3. 7. someone who seeks and exploits weaknesses in a computer system or computer network.​
  4. 8. written errors in someone's code or program.​
Down
  1. 1. If lots of infected systems combine to form a network it is called botnet.​
  2. 3. a type of social engineering where a hacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the hacker. ​
  3. 4. any technology, such as tracking software, that aids in gathering information about the person or organization without their knowledge.​
  4. 6. Unlike a computer virus, it does not need to attach itself to an existing program.