Across
- 2. a fictional virus modeled after the Stuxnet virus that is able to damage physical infrastructure.
- 3. extra copies of computer files that can be used to restore files that are lost or damaged.
- 6. a computer program that can copy itself and cause harm in various ways, such as stealing private
- 10. the amount of data that can pass through a network or part of a network per second.
- 13. or destroying data.
- 14. a computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
- 17. a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
- 18. someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
- 19. a company or organization that gives users and devices access to the Internet.
- 21. two or more interconnected devices that can exchange data.
Down
- 1. a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them.
- 2. a distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
- 4. attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
- 5. code written in a programming language that instructs computers to perform specific tasks.
- 7. a type of connection between devices that can exchange information and power supply.
- 8. a data storage device that is used to store, back up, and transfer computer files.
- 9. multiple computers on a network that are infected with a program that can be controlled remotely.
- 11. software designed to block malware from entering protected networks.
- 12. programs that harm computers, networks, or people.
- 15. viruses, worms, ransomware, and other
- 16. unsolicited emails sent to many addresses in order to make money through advertising or identity theft.
- 19. a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
- 20. the process of using codes to make readable information unreadable.