Cybersecurity

12345678
Across
  1. 2. Malware hidden inside another program.
  2. 4. A ransomware that attacks networks using a protocol that helps computers communicate with printers and other devices
  3. 7. Mechanism to run program
  4. 8. Vulnerability of a system or program that manages to cede control to unauthorized persons.
Down
  1. 1. Technology that allows the extension of the local area network a public network such as the Internet.
  2. 2. software that allows anonymous access to the Internet through a series of virtual tunnels or sub-layers that prevent direct connection to the network.
  3. 3. Exposure of private information.
  4. 5. Tool that captures data packets on a network.
  5. 6. Malware that copies itself and spreads across networks