Across
- 3. a standalone malware computer program that replicates itself in order to spread to other computers
- 6. a network security system that controls incoming and outgoing network traffic based on a set of rules
- 7. a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity
- 9. usually consists of eight bits
- 11. (abbreviation) a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period
- 13. (abbreviation) a way of injecting malicious scripts into web pages
- 14. type of software to detect unwanted programs on a computer
Down
- 1. a secret word or phrase that must be used to gain admission to something, you should never share yours with anyone!
- 2. generic name someone who seeks and exploits weaknesses in a computer system or computer network
- 3. a type of ransomware that attacked running Microsoft Windows operating systems in May 2017
- 4. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- 5. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed
- 8. the process of converting information or data into a code, especially to prevent unauthorized access
- 10. function of one way encryption that is normally used to check integrity of data
- 12. a type of malicious software designed to block access to a computer system until a sum of money is paid