Across
- 4. In order to ensure the security of the data/information, we need to ____________ the data:
- 5. _______ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- 6. _______ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- 9. ______ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
- 11. ________is actually considered the first computer virus?
- 13. ________ is when attackers send malicious emails designed to trick people into falling for a scam.
- 14. ______is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
- 1. __________is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- 2. Advertising software can be used to spread malware.
- 3. _______ is a program that secretly records what a user does so that cybercriminals can make use of this information.
- 7. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
- 8. _______ is a type of software designed to help the user's computer detect viruses and avoid them.
- 10. _______ is a type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computers where they cause damage or collect data.
- 12. _______ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
- 15. Which wifi cummunication protocol is more Secure?