DTIN - Digital Security

12345678910111213141516171819202122232425
Across
  1. 2. - Software that automatically displays or downloads advertising material when a user is online.
  2. 5. - A secret or undocumented way of gaining access to a program, online service, or an entire computer system.
  3. 9. - A standalone malware computer program that replicates itself to spread to other computers.
  4. 14. - Describes a hacker who violates computer security for little reason beyond maliciousness or for personal gain.
  5. 15. - A method of trying to gather personal information using deceptive e-mails and websites.
  6. 16. - The process of converting information or data into a code to prevent unauthorized access.
  7. 17. - The act of disguising a communication from an unknown source as being from a known, trusted source.
  8. 19. - A person who uses computers to gain unauthorized access to data.
  9. 20. - Malware that locks or encrypts data until a ransom is paid.
  10. 22. - A network of private computers infected with malicious software and controlled as a group.
  11. 23. - A type of surveillance technology used to record keystrokes.
  12. 25. - Software designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
  1. 1. - Statistical analysis of people's unique physical and behavioral characteristics.
  2. 3. - Distributed Denial of Service, a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable.
  3. 4. - Software that enables a user to obtain covert information about another's computer activities.
  4. 6. - Data sent from a website and stored on a user's computer by the user's web browser.
  5. 7. - A security process by which a list of permitted entities is created and defined as acceptable.
  6. 8. - Criminal activities carried out by means of computers or the internet.
  7. 10. - A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  8. 11. - Virtual Private Network, extends a private network across a public network, enabling users to send and receive data as if their computing devices were directly connected to the private network.
  9. 12. - A network security system that monitors and controls incoming and outgoing network traffic.
  10. 13. - A type of malware that is often disguised as legitimate software.
  11. 18. - A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
  12. 21. - Software designed to detect and destroy computer viruses.
  13. 24. - Secure Sockets Layer, the standard security technology for establishing an encrypted link between a web server and a browser.