Sovi.AI - AI Math Tutor

Scan to solve math questions

QUESTION IMAGE

cyber security across 2. a network security system, either hardware- or…

Question

cyber security
across

  1. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  2. a standalone malware computer program that replicates itself in order to spread to other computers.
  3. are similar to worms and trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the internet.
  4. software that enables a user to obtain covert information about anothers computer activities by transmitting data covertly from their hard drive.
  5. a method, often secret, of bypassing normal authentication in a product
  6. a local or restricted communications network, especially a private network created using world wide web software.
  7. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
  8. an attempt by hackers to damage or destroy a computer network or system.
  9. someone who seeks and exploits weaknesses in a computer system or computer network
  10. the activity of defrauding an online account holder of financial information by posing as a legitimate company.
  11. body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access

down

  1. any malicious computer program which is used to hack into a computer by misleading users of its true intent
  2. are small files that web sites put on your computer hard drive when you first visit
  3. any software program in which advertising banners are displayed while the program is running.
  4. used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
  5. global system of interconnected computer networks that use the internet protocol suite
  6. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
  7. designed to detect and destroy computer viruses.
  8. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
  9. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Explanation:

Brief Explanations

Below are the solved answers for the cybersecurity crossword, matched to each clue:

Across:
  1. A network traffic control system (hardware/software) → FIREWALL
  2. Self-replicating standalone malware → WORM
  3. Automated malware controlled remotely → BOT
  4. Software to spy on computer activity → SPYWARE
  5. Bypass normal authentication → EXPLOIT
  6. Restricted private network → INTRANET
  7. Data copy for loss recovery → BACKUP
  8. Hacker attempt to damage systems → CYBERATTACK
  9. Exploits system weaknesses → HACKER
  10. Fake company to steal financial data → PHISHING
  11. Protective tech/processes for systems → CYBERSECURITY
  12. Malicious code for system harm → MALWARE
  13. Global interconnected computer network → INTERNET
  14. Scramble data to block access → ENCRYPTION
  15. Detects and removes viruses → ANTIVIRUS
  16. Data copy for loss recovery → BACKUP
  17. Self-copying harmful code → VIRUS
Down:
  1. Malware that misleads users → TROJAN
  2. Small files from websites → COOKIES
  3. Software with advertising banners → ADWARE

Answer:

Across:
  1. FIREWALL
  2. WORM
  3. BOT
  4. SPYWARE
  5. EXPLOIT
  6. INTRANET
  7. BACKUP
  8. CYBERATTACK
  9. HACKER
  10. PHISHING
  11. CYBERSECURITY
  12. MALWARE
  13. INTERNET
  14. ENCRYPTION
  15. ANTIVIRUS
  16. BACKUP
  17. VIRUS
Down:
  1. TROJAN
  2. COOKIES
  3. ADWARE