9.3 Keywords

12345678910111213141516171819202122
Across
  1. 2. unintentional actions - or lack of action - by employees and users that cause, spread or allow a security breach to take place.
  2. 7. a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
  3. 9. A hacker is a person skilled in information technology who achieves goals by non-standard means.
  4. 11. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  5. 13. facts and statistics collected together for reference or analysis.
  6. 16. occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
  7. 18. the action of obtaining something by using persuasion or guile.
  8. 19. situation where the attacker can physically view the device screen and keypad to obtain personal information.
  9. 20. individuals that break the computing code of ethics, regulations, and laws for a malicious purpose.
  10. 21. all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons
  11. 22. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
  1. 1. any information that relates to an identified or identifiable living individual
  2. 3. The process of proving the claimed identity of an individual user, machine, software component or any other entity.
  3. 4. the process in which your software applies critical updates without seeking confirmation from a user.
  4. 5. when attackers attempt to trick users into doing 'the wrong thing', such as clicking a bad link that will download malware, or direct them to a dodgy website.
  5. 6. The authorization given to users that enables them to access specific resources on the network
  6. 8. facts provided or learned about something or someone.
  7. 10. an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
  8. 12. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
  9. 14. a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems
  10. 15. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  11. 17. an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.