9.3 key words

12345678910111213141516171819202122232425
Across
  1. 2. a situation where the attacker can physically view the device screen and keypad to obtain personal information
  2. 5. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  3. 7. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files
  4. 9. one that is done without the target of the hack being aware of it
  5. 14. an attack meant to shut down a machine or network, making it inaccessible to its intended users
  6. 17. the process in which your software applies critical updates without seeking confirmation from a user
  7. 18. type of malicious software, or malware, that spreads between computers and causes damage to data and software
  8. 19. a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service attacks, steal data, send spam, and allow the attacker to access the device and its connection.
  9. 20. facts provided or learned about something or someone.
  10. 22. where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service (SMS) text messages, to reveal sensitive information.
  11. 24. the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
  12. 25. an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
Down
  1. 1. a hacking method that uses trial and error to crackpasswords, login credentials, and encryption keys.
  2. 3. a person who breaks into a computer system. The reasons for hacking can be many: installing malware, stealing or destroying data, disrupting service, and more
  3. 4. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
  4. 6. the act of inventing a specific scenario to try and engage with the victim
  5. 8. a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites
  6. 10. unintentional actions - or lack of action - by employees and users that cause, spread or allow a security breach to take place
  7. 11. information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc
  8. 12. helps to identify verified users and allows them to access accounts and networks securely.
  9. 13. facts and statistics collected together for reference or analysis.
  10. 15. The authorization given to users that enables them to access specific resources on the network
  11. 16. an authorized attempt to gain unauthorized access to a computer system, application, or data
  12. 21. a type of software program created to protect information technology (IT) systems and individual computers from malicious software, or malware
  13. 23. write once, read many, or WORM, is a data storage technology that allows data to be written to a storage medium a single time and prevents the data from being erased or modified.