Across
- 4. a computer connected to a network that has been compromised by a hacker
- 5. a kind of software used to prevent, scan, detect and delete viruses from a computer
- 9. software that enables a user to covert information from another computer by transmitting data from their hard drive
- 10. software that allows an unauthorized user to access a computer
- 11. a type of malware that self replicates and infects other computers
- 13. a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
- 16. a type of malware that disguises itself as legitimate code or software\
- 17. software that displays advertising material
- 18. A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
- 1. a network security device that monitors and filters incoming and outgoing network traffic
- 2. a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
- 3. malicious software that blocks access to a computer until a sum of money is paid
- 6. an undocumented way of gaining access to a computer system
- 7. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- 8. a network of computers with malicious software
- 12. any program that prohibits a pop-up at some point in time
- 14. hackers who use automated techniques to scan specific network ranges and find vulnerable systems
- 15. software updates that address security vulnerabilities