Across
- 3. a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
- 5. Likes to chase mice
- 7. is a type of malware from cryptovirology that threatens to publish the victim's personal data unless the ransom is paid
- 8. game that teaches you about viruses
- 9. is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
- 11. often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard
- 15. is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
- 17. is a collection of updates and fixes, called patches, for an operating system or a software program.
- 19. is a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks.
- 21. designed to detect and destroy computer viruses
- 22. Flying mammal
- 24. malicious software bundle designed to give unauthorized access to a computer or other software
- 25. is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
- 26. Large marsupial
Down
- 1. is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- 2. is a type of malware that downloads onto a computer disguised as a legitimate program.
- 4. is a computer connected to a network that has been compromised by a hacker, a virus or a Trojan.
- 6. is caused by software or hardware errors.
- 10. is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
- 12. is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user
- 13. is any program that prohibits a pop-up at some point in time.
- 14. Man's best friend
- 16. is the practice of copying data from a primary to a secondary location, to protect it in case of a disaster, accident or malicious action
- 18. is unwanted software designed to throw advertisements up on your screen, most often within a web browser
- 20. Has a trunk
- 23. is a set of changes to a computer program or its supporting data designed to update, fix, or improve