Cyber security

123456789101112131415
Across
  1. 2. _______ is a program that secretly records what a user does so that cybercriminals can make use of this information. For example, spyware could capture credit card details.
  2. 7. _______ is a type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computers where they cause damage or collect data.
  3. 10. ______ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
  4. 11. _______ Malware locks down a user’s files and data, with the threat of erasing it unless a ransom is paid.
  5. 12. ________is actually considered the first computer virus?
  6. 13. _______ is a type of software designed to help the user's computer detect viruses and avoid them.
  7. 14. In order to ensure the security of the data/ information, we need to ____________ the data:
Down
  1. 1. _______ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  2. 3. ________ is when attackers send malicious emails designed to trick people into falling for a scam.
  3. 4. In Wi-Fi Security, which protocol is more used?
  4. 5. _______ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
  5. 6. ______is a type of software designed to gain unauthorized access or to cause damage to a computer.
  6. 8. __________is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  7. 9. Advertising software can be used to spread malware.
  8. 15. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.