cybersecurity terms

123456789101112131415161718
Across
  1. 4. a computer connected to a network that has been compromised by a hacker
  2. 5. a kind of software used to prevent, scan, detect and delete viruses from a computer
  3. 9. software that enables a user to covert information from another computer by transmitting data from their hard drive
  4. 10. software that allows an unauthorized user to access a computer
  5. 11. a type of malware that self replicates and infects other computers
  6. 13. a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
  7. 16. a type of malware that disguises itself as legitimate code or software\
  8. 17. software that displays advertising material
  9. 18. A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
  1. 1. a network security device that monitors and filters incoming and outgoing network traffic
  2. 2. a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
  3. 3. malicious software that blocks access to a computer until a sum of money is paid
  4. 6. an undocumented way of gaining access to a computer system
  5. 7. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  6. 8. a network of computers with malicious software
  7. 12. any program that prohibits a pop-up at some point in time
  8. 14. hackers who use automated techniques to scan specific network ranges and find vulnerable systems
  9. 15. software updates that address security vulnerabilities