Cyber security

1234567891011121314151617181920
Across
  1. 4. A separate program or a feature incorporated within a browser that stops popup advertisements from appearing
  2. 6. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action
  3. 8. A malware payload that allows an attacker to execute virtually any command on the victim's computer
  4. 10. Malware that prevents a user's device from properly operating until a fee is paid
  5. 12. Software code that gives access to a program or service that circumvents normal security protections.
  6. 14. A logical computer network of zombies under the control of an attacker
  7. 16. An attacker that sends unsolicited messages to Bluetooth-enable deceives
  8. 17. Software that helps prevent computers from becoming infected by different types of spyware
  9. 18. A database of viruses that is used to identify an infected file
  10. 20. An infected computer that is under the remote control of an attacker
Down
  1. 1. A general term used to describe software that spies on users by gathering information without consent
  2. 2. Software that is a cumulative package of all patches and feature updates
  3. 3. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard
  4. 5. A publicly released software security update intended to repair a vulnerability
  5. 7. A copy is files from a computer's hard drive saved on other digital media that is stored in a secure location
  6. 9. A malicious program designed to enter a computer via a network to take advantage of a vulnerabity in an application or an operating system
  7. 11. Computer code that lies dormant until it is triggered by specific logical event
  8. 13. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
  9. 15. Hardware or software designed to limit the spread of malware
  10. 19. Removing the built-in limitations and protection google android devices