IT Security

12345678910
Across
  1. 1. irrelevant or unsolicited messages sent over the internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc.
  2. 4. A person, organization entity, or automated process that accesses a system, whether authorized to do so or not.
  3. 7. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”
  4. 9. the practice of making computer files available to other users of a network, in particular the illicit sharing of music and video via the internet
  5. 10. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
Down
  1. 2. A technique used by hackers to obtain sensitive information.
  2. 3. A term that describes all forms of malicious software
  3. 5. a secret word or phrase that must be used to gain admission to a place
  4. 6. A defensive technology designed to keep the bad guys out
  5. 8. A type of malware aimed to corrupt, erase or modify information on a computer