Cybersecurity

123456789101112131415161718
Across
  1. 2. who interferes with normal computer functions
  2. 6. records or transmits a user's keystrokes
  3. 8. writing computer software code
  4. 9. client-side code injection attack
  5. 10. refers to any external entity who may have access to private data
  6. 11. gain unauthorized access to a computer system
  7. 13. network of maliciously installed bots
  8. 15. destroying a hardware by delivering a high-voltage electrical surge
  9. 16. cyber exploit directed at online card players
  10. 17. security risk who cause the program to crash
  11. 18. software tools used by a third party
Down
  1. 1. unauthorized duplication or deletion of an organization's electronic information
  2. 3. secure time-limited credential
  3. 4. attack that originates from many different sources
  4. 5. capable of being easily hurt
  5. 7. designed to take advantage of a particular error
  6. 12. possible source of harm
  7. 14. security mechanism for separating running programs