Cyber Words Crossword Puzzle

1234567891011121314151617181920
Across
  1. 3. blocker A separate program or a feature incorporated within a browser that stops popup advertisements from appearing.
  2. 6. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
  3. 9. Malware that prevents a user's device from properly operating until a fee is paid.
  4. 10. Software of hardware device that captures and stores each key stroke that a user types on a keyboard.
  5. 11. Software that spies on users by gathering information without consent.
  6. 13. A logical computer network of zombies under the control of an attacker.
  7. 14. pack Software that is a cumulative package of all patches and feature updates.
  8. 16. Software that helps prevent computers from becoming infected by different types of spyware.
  9. 17. An infected computer that is under the remote control of an attacker.
  10. 19. horse An executable program that is advertised as performing one activity but which actually performs a malicious activity.
  11. 20. bomb Computer code that lies dormant until it is triggered by a specific logical event.
Down
  1. 1. virus Malicious computer code that reproduces itself on the same computer.
  2. 2. update Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
  3. 4. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
  4. 5. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
  5. 7. firewall Software that runs as a program on the local computer to block or filter traffic coming into and out of the computer.
  6. 8. A malicious program designed to enter a computer via network to take advantage of a vulnerability in an application or an operating system.
  7. 12. Hardware of software designed to limit the spread of malware.
  8. 15. A set of software tools used by an attacker to hide the presence of other types of malicious software.
  9. 18. A publicly released software security update intended to repair a vulnerability.