Across
- 3. A standalone malware computer program that replicates itself to spread to other computers.
- 4. A type of malware that misleads users of its true intent.
- 6. The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- 8. A network of private computers infected with malicious software and controlled as a group.
- 9. A network security system that monitors and controls incoming and outgoing network traffic.
- 13. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 15. A vulnerability in software that is unknown to the parties responsible for patching or otherwise fixing the flaw.
- 16. A security mechanism set to detect, deflect, or counteract attempts at unauthorized use of information systems.
- 17. Software designed to detect and destroy computer viruses.
- 19. A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability.
Down
- 1. A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
- 2. The process of converting information or data into a code to prevent unauthorized access.
- 5. Malware that locks the victim's data and demands payment for the decryption key.
- 7. A type of surveillance software that records every keystroke made on a computer.
- 10. Software that enables a user to obtain covert information about another's computer activities.
- 11. A method, often secret, of bypassing normal authentication or securing remote access to a computer.
- 12. A piece of software designed to update, fix, or improve a computer program or its supporting data.
- 14. An attack meant to shut down a machine or network, making it inaccessible to its intended users.
- 17. Software that automatically displays or downloads advertising material when a user is online.
- 18. A tool that captures and analyzes packets of data as they pass through a network.
