Cyber security

12345678
Across
  1. 5. An annoying malware that spams you with ads
  2. 6. a collection of malware infested computers that form a network to attack
  3. 7. An important process that verifies a user is really who they are; many different ways this can be done
  4. 8. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
Down
  1. 1. When raw data is put into context and has meaning, the data transforms into _____
  2. 2. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  3. 3. Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
  4. 4. I am not a robot