Information Security

123456
Across
  1. 2. Once money is paid, the attacker gives a passcode to disinfect the system and remove the lock.
  2. 5. describes methods for ensuring that data stored on a computer system is protected against unauthorized access.
  3. 6. is a very broad term that includes spyware, ransomware, and viruses.
Down
  1. 1. is a computer user who enters/breaks into computer systems using hacking tools for their own personal gain without permission.
  2. 3. is a type of malware that enters in system and hides as if it is a legitimate program.
  3. 4. spread on their own through computer networks and don’t require the infected program to execute to activate.