Across
- 5. A set of instructions or rules followed by a computer to solve a problem or perform a task.
- 8. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 10. A software vulnerability that is exploited by attackers before the software developer becomes aware of it.
- 11. Measures taken to protect computer systems and networks from unauthorized access or attacks.
- 14. Footprint: The trail of data created by an individual's online activity.
- 15. Software intended to damage or disable computers or computer systems.
Down
- 1. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, used for criminal activities.
- 2. The study of communication and control processes in biological, mechanical, and electronic systems, especially the comparison of these processes in biological and artificial systems.
- 3. A person who uses computers to gain unauthorized access to data.
- 4. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
- 6. Bullying that takes place over digital devices like cell phones, computers, and tablets.
- 7. Web: Part of the internet that is not indexed by search engines and often associated with illegal activities.
- 9. The process of converting data into a code to prevent unauthorized access.
- 12. Reality: A computer-generated simulation of an environment that can be interacted with in a seemingly real or physical way.
- 13. Theft: The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.