Across
- 3. : Prevent spam by temporarily rejecting communications from unknown senders
- 5. : Malicious code that can cause harm to your anyone who watches the infected ad
- 6. : Malware that disguise itself as a normal program to infect a system
- 8. : Type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files
- 9. : Security measure to distinguish human from machine input
- 10. : Set of software tools that enable an unauthorized user to gain control of a computer system without being detected
Down
- 1. : Process that transforms encrypted information into its original format
- 2. : Turns domain names into ip addresses
- 4. : Vulnerability in software or hardware that is unknown to the vendor and for which no patch or other fix is available
- 7. : Force a website, computer, or online service offline by flooding the target with many requests
