Across
- 2. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 6. Any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- 7. Any software program in which advertising banners are displayed while the program is running.
- 10. designed to detect and destroy computer viruses.
- 12. Used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- 14. Made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
Down
- 1. Are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the internet.
- 3. A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 4. Are small files that websites put on your computer hard disk drive when you first visit.
- 5. Refers to the process of making copies of data or data files to use in the event the original data files are lost or destroyed.
- 8. An attempt by hackers to damage or destroy a computer network or system.
- 9. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- 11. Someone who seeks and exploits weaknesses in a computer system or computer network.
- 13. A standalone malware computer program that replicates itself in order to spread to other computers.
