Across
- 2. any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission
- 3. establishes a barrier between a trusted network and an untrusted network
- 6. An undocumented way of gaining access to computer system
- 7. an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy
- 8. a system where hackers can see your keystrokes
- 9. a set of changes to a computer program designed to update, fix, or improve it
- 11. a computer program used to prevent, detect, and remove malware
- 13. software that is designed to damage a PC
- 18. a mandatory access control enforcement feature
- 19. a collection of computer software, typically malicious, designed to enable access to a computer
Down
- 1. is software that generates revenue for its developer
- 3. contain not only security and quality revisions, but also significant feature additions and changes
- 4. blocker and system to block unwanted screen popups
- 5. a type of program designed to prevent and detect unwanted spyware program installations
- 10. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
- 12. a type of malware from cryptovirology that threatens to publish the victim's personal data
- 14. a copy of computer data taken and stored elsewhere
- 15. a piece of code intentionally inserted into a software system that will set off a malicious function
- 16. a malicious program that is installed on a device that transforms it
- 17. a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system