cybersecurity

12345678910111213
Across
  1. 2. an interruption in authorized users access to a computer network, typically one caused with malicious intent
  2. 4. an exchange of keys where the parties involved are not authenticated, meaning fraud can happen.
  3. 6. A form of denial of service attack desgined to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system
  4. 8. software that generates revenue by throwing ads up on your screen
  5. 9. a software or hardware tool that allows the user to monitor your internet traffic
  6. 10. a situation in which a person or program successfully identifies itself as another by falsifying data
  7. 11. a computer that is connected to the internet and taken over by a computer worm, virus, or other malware
  8. 12. malicious software designed to steal data and harm or destroy computers.
  9. 13. occurs when multiple machines are operating together to attack one target
Down
  1. 1. a malfunction of a hardware or a software component
  2. 3. A computer virus written in the same type of macro language as things like excel or word
  3. 5. ethical hacking
  4. 7. a type of malware that infects your computer and harms its master boot partition
  5. 10. any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  6. 12. average time between repairable failures of a technology product