Across
- 4. any program designed to disrupt, damage, or gain unauthorized access to a computer system.
- 5. a security professional who operates between white hat (ethical) and black hat (malicious) hackers
- 7. a type of standalone, self-replicating malware that spreads automatically across networks without human intervention.
- 8. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- 9. a network security system that acts as a barrier between a trusted internal network (or computer) and untrusted external networks, such as the internet.
- 10. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information
Down
- 1. an automatic legal right protecting original creative works—such as literature, art, music, films, and software—once they are expressed in a tangible form. I
- 2. malicious software (malware) disguised as legitimate, harmless software, designed to trick users into installing it.
- 3. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 6. the practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
