Common Cyber Terms
Across
- 4. Attempt by an unauthorised entity or attacker to gain illegitimate access to a system by posing as an authorised user
- 5. A type of network layer firewall
- 6. A weakness in software programs that can be exploited
- 9. Provides additional, revised or updated code for an operating system or application
- 10. Used to gain unauthorised access to a computer or a network
Down
- 1. Uses asymmetric key encryption
- 2. An attack requiring a carrier file to self-replicate
- 3. Gives a hacker remote access to, and control over, a computer or network
- 7. Verify the identity of a user
- 8. Encrypted parts of the internet that are not indexed by search engines