Across
- 3. person who finds and exploits the weakness in computer systems.
- 5. process of finding weakness in computer or private networks.
- 6. comprises a collection of internet-connected computers and devices that are infected and controlled remotely by cybercriminals.
- 8. designed to disrupt, damaged, or gain unauthorized access to a computer system.
- 10. exploits vulnerabilities on the device to encrypt important files.
- 12. an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
Down
- 1. used to obtained sensitive information from users.
- 2. that downloads onto a computer disguised as a legitimate program.
- 4. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- 7. a secret word or phrase that must be used to gain admission to a place.
- 9. malicious software.
- 11. monitors the victim's internet activity, tracks login credentials and spies on sensitive information.
