9.3 key words
Across
- 2. a situation where the attacker can physically view the device screen and keypad to obtain personal information
- 5. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- 7. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files
- 9. one that is done without the target of the hack being aware of it
- 14. an attack meant to shut down a machine or network, making it inaccessible to its intended users
- 17. the process in which your software applies critical updates without seeking confirmation from a user
- 18. type of malicious software, or malware, that spreads between computers and causes damage to data and software
- 19. a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service attacks, steal data, send spam, and allow the attacker to access the device and its connection.
- 20. facts provided or learned about something or someone.
- 22. where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service (SMS) text messages, to reveal sensitive information.
- 24. the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
- 25. an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
Down
- 1. a hacking method that uses trial and error to crackpasswords, login credentials, and encryption keys.
- 3. a person who breaks into a computer system. The reasons for hacking can be many: installing malware, stealing or destroying data, disrupting service, and more
- 4. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
- 6. the act of inventing a specific scenario to try and engage with the victim
- 8. a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites
- 10. unintentional actions - or lack of action - by employees and users that cause, spread or allow a security breach to take place
- 11. information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc
- 12. helps to identify verified users and allows them to access accounts and networks securely.
- 13. facts and statistics collected together for reference or analysis.
- 15. The authorization given to users that enables them to access specific resources on the network
- 16. an authorized attempt to gain unauthorized access to a computer system, application, or data
- 21. a type of software program created to protect information technology (IT) systems and individual computers from malicious software, or malware
- 23. write once, read many, or WORM, is a data storage technology that allows data to be written to a storage medium a single time and prevents the data from being erased or modified.