Across
- 4. - A computer controlled by someone else without the owner's knowledge
- 7. - Software designed to detect and destroy computer viruses
- 9. - Malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
- 10. - Uninterruptible Power Supply, a device that provides emergency power
- 11. - Hidden access to a computer system that bypasses security mechanisms
- 14. - Measures taken to guard against espionage or sabotage, crime, attack, or escape
- 15. - Distributed Denial of Service attack
- 18. - Process of encoding messages or information
- 20. - Security system that controls the incoming and outgoing network traffic
- 22. - Action of regaining possession or control of something stolen or lost
- 24. - Malicious software that includes viruses and worms
- 25. - A copy of a file or other item of data made in case the original is lost or damaged
Down
- 1. - Pertaining to or using digits, particularly binary
- 2. - Software that records the keys struck on a keyboard
- 3. - Unwanted electrical signal causing disturbances in communication systems
- 5. - Network of compromised computers controlled by malicious actors
- 6. - Software that appears legitimate but can take control of your computer
- 8. - Sudden powerful forward or upward movement, especially by a crowd or by a natural force such as the waves or tide
- 12. - Moral principles that govern a person's behavior or conducting of an activity
- 13. - Software that automatically displays or downloads advertising material
- 16. - Software that enables a user to obtain covert information about another's computer activities
- 17. - Online or Internet-based illegal act
- 19. - Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
- 21. - Malicious software that copies itself and consumes system resources
- 23. - A potentially damaging computer program that replicates itself
