Cyber Security.

123456789101112131415161718192021222324252627
Across
  1. 2. Obtaining access to another system without permission.
  2. 5. software that lets a user to obtain information about another's computer activities.
  3. 9. is a software that blocks access to the victim's data and threatens to publish or delete it until ransom is paid.
  4. 11. is the attempt to obtain sensitive information such as usernames, passwords, and credit card details.
  5. 13. a person who gains unauthorized access to computer files or networks in order to further social or political ends.
  6. 14. the action of protecting, or the state of being protected.•a person or thing that protects someone or something.
  7. 15. software which is specifically designed to damage a computer system.
  8. 18. the process of converting information or data into a code, especially to prevent unauthorized access.
  9. 21. network of computers infected with malicious software and controlled as a group without the owners' knowledge.
  10. 22. software that gets into your devise without you knowing.
  11. 24. Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction.
  12. 26. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  13. 27. Irrelevant messages sent over the Internet, typically to large numbers of users, for advertising.
Down
  1. 1. •a string of characters that allows access to a computer, interface, or system.
  2. 3. A group or system of interconnected people or things.
  3. 4. is a cyber attack redirecting a website's traffic to another from a fake site.It can be conducted by changing the hosts file on the computer.
  4. 6. A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system.
  5. 7. a situation involving exposure to danger.
  6. 8. Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message.
  7. 10. software that attaches itself to all you contacts and sends itself to others in an endless cycle.
  8. 12. network an online community of people with a common interest who use a website or other technologies to communicate with each other and share information, resources You tend to be in a community with friends, colleagues and family.
  9. 16. the fraudulent practice of using another person's name and personal information in order to obtain credit, loans.
  10. 17. logger a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
  11. 19. an attempt by hackers to damage or destroy a computer network or system.
  12. 20. Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
  13. 23. a person who uses computers to gain unauthorized access to data.
  14. 25. In computing, a denial-of-service attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable for the user.