Network security

123456789101112
Across
  1. 3. type of malicious code or software that looks legitimate but can take control of your computer
  2. 5. an online scam similar to phishing, where a website's traffic is manipulated, and confidential information is stolen.
  3. 7. Groups of criminals who unite to carry out cyber attacks in support of political causes.
  4. 8. Also known as “white hats,” ethical hackers are security experts that perform these security assessments
  5. 10. type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  6. 12. The practice of protecting systems, networks, and programs from digital attacks
Down
  1. 1. “Flags” are secrets purposely placed by companies or hackers. Planting the flag itself refers to placing these flags
  2. 2. the practice of using a software program or hardware device (keylogger ) to record all keystrokes on a computer keyboard, either overtly as a surveillance tool or covertly as spyware
  3. 4. a type of malicious software, or malware, that spreads between computers and causes damage to data and software
  4. 6. malware that employs encryption to hold a victim's information at ransom
  5. 9. any program or file that is intentionally harmful to a computer, network or server.
  6. 11. A person who breaks into a computer system