Across
- 2. - Software that automatically displays or downloads advertising material when a user is online.
- 5. - A secret or undocumented way of gaining access to a program, online service, or an entire computer system.
- 9. - A standalone malware computer program that replicates itself to spread to other computers.
- 14. - Describes a hacker who violates computer security for little reason beyond maliciousness or for personal gain.
- 15. - A method of trying to gather personal information using deceptive e-mails and websites.
- 16. - The process of converting information or data into a code to prevent unauthorized access.
- 17. - The act of disguising a communication from an unknown source as being from a known, trusted source.
- 19. - A person who uses computers to gain unauthorized access to data.
- 20. - Malware that locks or encrypts data until a ransom is paid.
- 22. - A network of private computers infected with malicious software and controlled as a group.
- 23. - A type of surveillance technology used to record keystrokes.
- 25. - Software designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
- 1. - Statistical analysis of people's unique physical and behavioral characteristics.
- 3. - Distributed Denial of Service, a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable.
- 4. - Software that enables a user to obtain covert information about another's computer activities.
- 6. - Data sent from a website and stored on a user's computer by the user's web browser.
- 7. - A security process by which a list of permitted entities is created and defined as acceptable.
- 8. - Criminal activities carried out by means of computers or the internet.
- 10. - A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- 11. - Virtual Private Network, extends a private network across a public network, enabling users to send and receive data as if their computing devices were directly connected to the private network.
- 12. - A network security system that monitors and controls incoming and outgoing network traffic.
- 13. - A type of malware that is often disguised as legitimate software.
- 18. - A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
- 21. - Software designed to detect and destroy computer viruses.
- 24. - Secure Sockets Layer, the standard security technology for establishing an encrypted link between a web server and a browser.
