Cyber Security Crossword
479 views
- Email sent to users to try and gain credentials or private data
- Intrusive software intended to harm the user's device
- Scrambling data using an algorithm
- Malicious program designed to extort money from the victim
- Virtual perimeter around a network to prevent viruses, hackers, etc.
- Taking advantage of a vulnerability or flaw
- Attacker pretending to bee an authorized user trying to gain access to a system
- Virus detection program to protect users from harmful programs
- A vulnerability in a program's code that attackers might take advantage of
- Attempt to break through security perimeters mainly done to acquire private info
1 p | 2 m | ||||||||||||||||||
h | 4 r | a | n | s | o | m | w | a | r | e | |||||||||
i | 3 6 e | x | p | l | o | i | t | ||||||||||||
7 s | p | o | o | f | i | n | g | w | |||||||||||
h | c | a | 10 c | ||||||||||||||||
i | r | r | y | ||||||||||||||||
n | y | e | b | ||||||||||||||||
9 b | u | g | p | e | |||||||||||||||
8 a | n | t | i | v | i | r | u | s | |||||||||||
a | |||||||||||||||||||
t | |||||||||||||||||||
t | |||||||||||||||||||
5 f | i | r | e | w | a | l | l | ||||||||||||
c | |||||||||||||||||||
k |