cyber security

12345
Across
  1. 3. an attempt by hackers to damage or destroy a computer network or system
  2. 5. designed to detect and destroy computer viruses
Down
  1. 1. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
  2. 2. are small files that Web sites put on your computer hard disk drive when you first visit
  3. 3. any software program in which advertising banners are displayed while the program is running
  4. 4. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed