cyber security

123456789
Across
  1. 3. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
  2. 5. vector: The technique a hacker uses to gain access to a computer or network in order to achieve a malicious outcome.
  3. 6. privilege: Having ultimate control of any given system.
  4. 7. Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
  5. 8. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
Down
  1. 1. A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.
  2. 2. Persistent Threats: When an unauthorized user invades a network, stays for an extended period of time, and steals data without harming the network.
  3. 3. hat hacking Hacking with malicious intent. Typically to gain access to a computer and steal as much data as possible.
  4. 4. The way in which the identity of a user is confirmed.
  5. 9. Software that automatically displays or downloads material when a user is offline.