Cyber Security

12345678910111213141516
Across
  1. 6. the process of converting information or data into a code, especially to prevent unauthorized access
  2. 8. A software designed to detect and destroy computer viruses
  3. 9. A network of private computers infected with malicious software and controlled as a group without the owners knowledge
  4. 10. A unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission
  5. 11. A software that enables a user to obtain covert information about another computer
  6. 12. Theft the fraudulent practice of using another person's name and personal information in order to obtain credits and loans
  7. 14. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  8. 15. A standalone malware computer program that replicates itself in order to spread to other computers
  9. 16. A person who uses computers to gain unauthorized access to data
Down
  1. 1. A software which is specifically designed to disrupt, damage, or gain authorized access to a computer system
  2. 2. A program designed to breach the security of a computer system while ostensibly performing some innocuous function
  3. 3. A Computer security also known as cyber security or IT security of computer systems from the theft or damage to their hardware
  4. 4. A attempt by hackers to damage or destroy a computer network or system
  5. 5. A type of malicious software designed to block access to a computer system until a sum of money is paid
  6. 7. A vulnerability of an organization's internal resources that arises from the organization using the Internet to conduct business
  7. 13. A statement of an intention to inflict pain, injury, damage, or other hostile action on someone in retribution for something done or not done