Across
- 3. distributed denial of service
- 4. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- 6. a set of changes to a computer program or its supporting data designed to update, fix, or improve it.
- 7. The transmission (spreading) of signals from one place to another
- 8. an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
- 10. a group of eight bits, which is called a byte
- 11. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card number
- 12. the programs and other operating information used by a computer
- 14. when someone clicks website to website
- 18. a standalone malware computer program that replicates itself in order to spread to other computers
Down
- 1. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
- 2. software or a computer system is generally an undocumented portal that allows an administrator to enter the system to troubleshoot or do upkeep
- 3. an interruption in an authorized user's access to a computer network, typically one caused with malicious intent.
- 5. any set of processing elements that move data from one system to another, possibly transforming the data along the way.
- 9. messages distributed by electronic means from one computer user to one or more recipients via a network.
- 13. any malware which misleads users of its true intent
- 15. a group of binary digits or bits (usually eight) operated on as a unit
- 16. Structured Query Language
- 17. defect imperfect
