Cyper attack

12345678910
Across
  1. 1. - When a perpetrator positions himself in a conversation between a user and application.
  2. 2. - Device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic
  3. 7. - A malicious piece of computer code designed to spread from device to device.
  4. 8. - information unreadable by anyone who is not explicity authorized to view the data.
  5. 10. - holds a victim's information at ransom.
Down
  1. 1. - a software designed to damage computer and computer system
  2. 3. - a program that provides continued privileged access to a computer while hiding it's presence.
  3. 4. - A large group of malware- infected internet- connected devices controlled by a single operator.
  4. 5. - attack meant to shut down a machine or network.
  5. 6. - it secretly gathers information and relays the data to other parties.
  6. 7. - Hide your IP address and physical location
  7. 9. computing - the delivery of hosted service