Across
- 2. malicious software that secretly installs on your device to steal personal data like passwords, browsing habits, and financial details, often without your knowledge, causing identity theft, fraud, or system slowdowns
- 4. Unsolicited messages sent to a large group of people
- 9. backup of all changes made since last full backup
- 13. malware disguised as legitimate software, tricking users into installing it to gain unauthorized access to their systems for stealing data, creating backdoors, or causing damage like deleting files
- 14. the process of securing a system from attacks by discovering/reducing system vulnerabilities
- 15. a type of malicious software (malware) that attaches to legitimate files, replicates itself, and spreads to other programs and devices, often without the user's knowledge
Down
- 1. Consists of security controls designed to protect individual computers
- 3. type of self-replicating malware that spreads across networks, exploiting security flaws to infect other devices independently
- 5. unwanted software that secretly installs on your device to bombard you with ads, slowing performance and posing security risks
- 6. has digital technology similar to a flash drive, no moving parts
- 7. backup of any daily changes or new data files
- 8. stores data using laser technology
- 10. complete copy of all data files
- 11. Emails that “fish” for users’ private information
- 12. uses electronic technology; needs USB port to connect/save files
