3.6 Fundamentals of Networks Part 2
Across
- 2. When organisations employ specialists to simulate potential attacks on their system. It is used to identify possible weaknesses in their cyber security.
- 3. Uses parts of a person to identify them and allow them access.
- 5. When hackers send emails or texts to people claiming to be from a well-known business.
- 7. Can see what a user is doing and sends that info back to the hacker.
- 11. When someone pretends to be someone else to persuade the victim to share information.
- 13. Sends an email to verify a users identity.
- 14. What term is used for protecting networks, data, programs and computers against damage cyber attacks and unauthorised access.
- 15. Simulates an external cyber attack. The person carrying out the attack will not be given any credentials, but they will have to carry out the attack in any way they can.
- 16. A method of hacking where a user is directed to a fake version of a website.
Down
- 1. The term used when data is transferred into a code that cannot be hacked.
- 4. Watching over someones shoulder.
- 6. Engineering Using people to gain private information or access to networks.
- 8. Simulates a malicious insider who has knowledge of the system.
- 9. USB drive or SD card
- 10. Common way of preventing hackers accessing information.
- 12. Simulates a person who has access to the target.