Cyber Society

123456789101112131415
Across
  1. 5. A set of instructions or rules followed by a computer to solve a problem or perform a task.
  2. 8. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  3. 10. A software vulnerability that is exploited by attackers before the software developer becomes aware of it.
  4. 11. Measures taken to protect computer systems and networks from unauthorized access or attacks.
  5. 14. Footprint: The trail of data created by an individual's online activity.
  6. 15. Software intended to damage or disable computers or computer systems.
Down
  1. 1. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, used for criminal activities.
  2. 2. The study of communication and control processes in biological, mechanical, and electronic systems, especially the comparison of these processes in biological and artificial systems.
  3. 3. A person who uses computers to gain unauthorized access to data.
  4. 4. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in electronic communication.
  5. 6. Bullying that takes place over digital devices like cell phones, computers, and tablets.
  6. 7. Web: Part of the internet that is not indexed by search engines and often associated with illegal activities.
  7. 9. The process of converting data into a code to prevent unauthorized access.
  8. 12. Reality: A computer-generated simulation of an environment that can be interacted with in a seemingly real or physical way.
  9. 13. Theft: The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.