Cyber Security Crossword

12345678910
Across
  1. 2. What allow a visited website to store its own information about a user on the user's computer?
  2. 8. Key logger is a ........
  3. 9. Phishing is a form of ..........
Down
  1. 1. What describes programs that can run independently travel from system to system and disrupt computer communication?
  2. 3. To hide information inside a picture, what technology is used?
  3. 4. The first computer virus is ........
  4. 5. What is the best keyword for taking advantage of a weakness in the security of an IT system?
  5. 6. When a person is harassed repeatedly by being followed, called or be written to he/she is a target of .........
  6. 7. A virus that migrates freely within a large population of unauthorized email user is called a ........
  7. 10. A packet with no flags set is which type of scan?