Across
- 4. Software tool used by intruders to secretly get an access to user's computer
- 5. Program that replicates itself by copying its code to another programs, boot sector or files
- 6. A network security system that monitors and controls incoming and outgoing network traffic
- 8. Process of a virus entering a computer or certain areas of a computer or files
- 11. A type of malware that locks a computer or hijacks a user's files until a ransom is paid
- 12. A computer program that seems to be harmless, but it does some form of damage
- 14. A software or hardware tool that records the keys struck on a keyboard
- 15. Software that installs components on a computer for recording Web surfing habits
- 16. / Any program or file that is harmful to a computer user
- 18. A program that is often used to maliciously redirect Internet connections
- 19. Someone who accesses a computer illegally or without authorisation
Down
- 1. This is the condition which causes the virus to activate or to release its payload
- 2. A program or piece of code that finds and takes advantage of a security flaw in an application or system so that cybercriminals can use it for their benefit
- 3. An attack which targets online users for extraction of their sensitive information such as username, password and credit card information
- 5. A weakness which allows an attacker to reduce a system's information assurance
- 7. A self-replicating virus that does not alter files but duplicates itself
- 9. A method of gaining access to system bypassing the normal procedure
- 10. A secret method that may be embedded to software to provide unauthorized access to data
- 13. A term used to classify applications that are being annoying or undesirable but less serious than malware
- 17. Software that displays advertising banners on Web browsers