Across
- 4. You could say that you can never make yourself 100% secure against attackers.
- 5. Trojans, spyware, adware, and worms are all examples of this
- 8. Users on a network can be put into groups, with each group having a unique set of privileges
- 9. This is type of malware that is installed by the user of the computer without them knowing it's malware
- 10. this is a type of malware that looks at what you do on your computer and can log everyone of your keystrokes
Down
- 1. It scans the data to make sure it doesn’t contain anything malicious and that it follows the rules set by the network.
- 2. is software that scans any file that is able to execute code
- 3. is the term for when human users of a system are tricked into providing confidential information
- 6. a software that automatically checks for available updates for the software you have on your computer.
- 7. a large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system?
