Across
- 1. State of being safe / free from danger or threat
- 5. a form of malicious code that looks like a legit file, program or application, but actually is designed to control the user's computer and data
- 6. A person or event that has the potential for impacting a valuable resource in a negative manner
- 8. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
- 10. The programs and other operating information used by a computer
- 11. is an attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
Down
- 2. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- 3. Good guys in the world of cybercrime. Hackers who use their skills and talents for good
- 4. extends a private network across a public network and enables users to send and receive data across shared or public networks
- 7. a list of permitted items that are automatically let through whatever gate is being used.
- 9. name commonly given to unsolicited email.