Across
- 2. Malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.
- 5. A cyberattack that takes place before the security community and/or software developers become aware of and fix a security vulnerability.
- 6. An attack on an information system that takes advantage of a particular system vulnerability.
Down
- 1. A business policy that permits, and in some cases, encourages employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet.
- 3. A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.
- 4. A harmful program that resides in the active memory of the computer and duplicates itself.
