Cybersecurity 2.2

123456789
Across
  1. 2. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data
  2. 5. Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running
  3. 7. A file that contains an official record of activities that occur on a computer
  4. 8. software that replicates and infects many computers, turning the computer into a "zombie"
  5. 9. Reverse the encryption process, making the data human-readable again
Down
  1. 1. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet
  2. 3. Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information
  3. 4. Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc
  4. 6. Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it