Cyper attacks

1234567891011
Across
  1. 2. - Hide your IP address and physical location
  2. 3. - a software designed to damage computer and computer system
  3. 5. - A malicious piece of computer code designed to spread from device to device.
  4. 8. computing - the delivery of hosted service
  5. 10. - a program that provides continued privileged access to a computer while hiding it's presence.
  6. 11. - it secretly gathers information and relays the data to other parties.
Down
  1. 1. - information unreadable by anyone who is not explicity authorized to view the data.
  2. 3. - When a perpetrator positions himself in a conversation between a user and application.
  3. 4. - holds a victim's information at ransom.
  4. 6. - Device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic
  5. 7. - A large group of malware- infected internet- connected devices controlled by a single operator.
  6. 9. - attack meant to shut down a machine or network.