Across
- 5. An annoying malware that spams you with ads
- 6. a collection of malware infested computers that form a network to attack
- 7. An important process that verifies a user is really who they are; many different ways this can be done
- 8. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
Down
- 1. When raw data is put into context and has meaning, the data transforms into _____
- 2. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- 3. Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
- 4. I am not a robot