cybersecurity awareness

12345678910111213141516
Across
  1. 3. is a string of characters used for authenticating a user on acomputer system
  2. 6. A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
  3. 8. is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  4. 10. refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  5. 11. A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
  6. 14. a local or restricted communications network, especially a private network created using World Wide Web software.
  7. 15. an electronic device for storing and processing data
  8. 16. is a type of malware that is often disguised as legitimate software
Down
  1. 1. is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
  2. 2. is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
  3. 4. is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
  4. 5. is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
  5. 7. The translation of data into a secret code.The most effective way to achieve data security.
  6. 9. The global communication network that allows almost allcomputers worldwide to connect and exchange information.
  7. 12. the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
  8. 13. software that is intended to damage or disable computers and computer systems.