Across
- 2. _______ is a program that secretly records what a user does so that cybercriminals can make use of this information. For example, spyware could capture credit card details.
- 7. _______ is a type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computers where they cause damage or collect data.
- 10. ______ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
- 11. _______ Malware locks down a user’s files and data, with the threat of erasing it unless a ransom is paid.
- 12. ________is actually considered the first computer virus?
- 13. _______ is a type of software designed to help the user's computer detect viruses and avoid them.
- 14. In order to ensure the security of the data/ information, we need to ____________ the data:
Down
- 1. _______ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- 3. ________ is when attackers send malicious emails designed to trick people into falling for a scam.
- 4. In Wi-Fi Security, which protocol is more used?
- 5. _______ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- 6. ______is a type of software designed to gain unauthorized access or to cause damage to a computer.
- 8. __________is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- 9. Advertising software can be used to spread malware.
- 15. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.