Cybersecurity Terms

1234567891011121314151617181920212223
Across
  1. 2. Multiple infected computers controlled remotely.
  2. 6. Amount of data that can pass through a network per second.
  3. 9. Disrupts services for political or social reasons.
  4. 10. Program that can copy itself and cause harm.
  5. 12. Consists of code instructing computers.
  6. 16. Connection between devices for information exchange.
  7. 18. Provides users and devices access to the Internet.
  8. 19. Data storage device for files.
  9. 20. Records keystrokes and sends them to an attacker.
  10. 22. Updates computer programs to fix vulnerabilities.
  11. 23. Software blocking malware from entering networks.
Down
  1. 1. Computer programs that block, detect, and remove viruses and malware.
  2. 3. Flaw in a program hackers exploit.
  3. 4. Provides specific services on a network.
  4. 5. Attempts to trick people into revealing sensitive information.
  5. 7. Fictional virus damaging physical infrastructure.
  6. 8. Harmful software including viruses and worms.
  7. 11. Process of making information unreadable.
  8. 13. Interconnected devices exchanging data.
  9. 14. Attempt to overwhelm online services with traffic.
  10. 15. Holds computer files hostage for ransom.
  11. 17. Unsolicited emails sent to many addresses.
  12. 21. Extra copies of files for restoring lost or damaged data.