Cyber Security Awareness
Across
- 3. - a malicious computer program that displays intrusive pop-up advertisements
- 6. - malware designed to deny access to files by encrypting
- 10. - A flaw or weakness in the computer
- 11. - function used to map data of arbitrary size to fixed-size values
- 14. - taking information and images from other people and uses them to create a new identity for themselves
- 16. - deceiving, pressuring or manipulating people into sending information to wrong people
- 17. - covert method of bypassing normal authentication or encryption in a computer
- 20. - exploit of a vulnerability
- 21. - personal data leak
- 22. - unauthorized alteration of personal data
- 23. - attackers pretend to be an authentic user
- 24. - Hackers demand ransom in this currency
Down
- 1. - install a backdoor in the infected computer
- 2. - vulnerability in a computer system that was previously unknown to its developers or anyone capable of mitigating it
- 4. - website made unavailable to legitimate user
- 5. - group of computers which have been infected and under the control of a malicious actor
- 7. - software tool designed to take advantage of a flaw in a computer system
- 8. - data is complete, trustworthy
- 9. - Malicious software which is installed in your system
- 12. - updates that address security vulnerabilities within a program or product
- 13. - India's first comprehensive data protection law
- 14. - hiding or coding information so that only the person a message was intended for can read it
- 15. - person who attempts to gain unauthorized access to a system
- 18. - right to control how your information is viewed and used
- 19. - Browser for the dark web