Puzzle - 10

12345678910
Across
  1. 2. a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
  2. 5. a network security system that filters unsanctioned incoming and outgoing traffic.
  3. 6. Refers to a program that is run entirely from the network, without requiring any installation of software on the endpoint device running the program
  4. 7. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  5. 10. the use of online ads to distribute malicious programs. Cybercriminals embed a special script in a banner, or redirect users who click on an ad to a special page containing code for downloading malware.
Down
  1. 1. a term commonly used to describe a person who tries to gain unauthorized access into a network or computer system.
  2. 3. involves tricking someone into clicking on one object on a web page while they think they are clicking on another.
  3. 4. Customizable additions to software for extra functionality
  4. 8. Computing recourses that make it available to access your files and services through the internet from any point in the world.
  5. 9. contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.