Across
- 1. A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- 3. An attempt by hackers to damage or destroy a computer network or system.
- 6. Computational Procedure
- 8. Conceals the data’s original meaning to prevent it from being known or used.
- 9. A software exploit that involves a combination of attacks against different vulnerabilities (7,6)
- 10. A standalone malware computer program that replicates itself in order to spread to other computers
- 11. Used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. (9,4)
- 12. Text files with small pieces of data
- 13. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Down
- 2. Designed to detect and destroy computer viruses
- 4. Any malicious computer program which is used to hack into a computer by misleading users of its true intent.(6,5)
- 5. A large number of compromised computers
- 7. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- 9. Often installed after a compromise happens (4,4)