Data Confidentiality - Day 02

12345678910
Across
  1. 2. An infected computer which is controlled by an attacker
  2. 4. Prevents malware from entering a computer
  3. 6. Security update intended to cover vulnerabilities
  4. 7. Is an external device used for backups
  5. 9. Displays a fictitious warning
Down
  1. 1. Captures key strokes
  2. 3. Runs on a computer without the owner's knowledge
  3. 5. Sends itself to other computers over the network
  4. 8. Gives access to a program or service while bypassing normal security measures
  5. 10. Delivers advertising content