Across
- 3. type of malicious code or software that looks legitimate but can take control of your computer
- 5. an online scam similar to phishing, where a website's traffic is manipulated, and confidential information is stolen.
- 7. Groups of criminals who unite to carry out cyber attacks in support of political causes.
- 8. Also known as “white hats,” ethical hackers are security experts that perform these security assessments
- 10. type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
- 12. The practice of protecting systems, networks, and programs from digital attacks
Down
- 1. “Flags” are secrets purposely placed by companies or hackers. Planting the flag itself refers to placing these flags
- 2. the practice of using a software program or hardware device (keylogger ) to record all keystrokes on a computer keyboard, either overtly as a surveillance tool or covertly as spyware
- 4. a type of malicious software, or malware, that spreads between computers and causes damage to data and software
- 6. malware that employs encryption to hold a victim's information at ransom
- 9. any program or file that is intentionally harmful to a computer, network or server.
- 11. A person who breaks into a computer system