Common Cyber Terms

12345678910
Across
  1. 4. Attempt by an unauthorised entity or attacker to gain illegitimate access to a system by posing as an authorised user
  2. 5. A type of network layer firewall
  3. 6. A weakness in software programs that can be exploited
  4. 9. Provides additional, revised or updated code for an operating system or application
  5. 10. Used to gain unauthorised access to a computer or a network
Down
  1. 1. Uses asymmetric key encryption
  2. 2. An attack requiring a carrier file to self-replicate
  3. 3. Gives a hacker remote access to, and control over, a computer or network
  4. 7. Verify the identity of a user
  5. 8. Encrypted parts of the internet that are not indexed by search engines