Computer Professions and Cyber crimes
Across
- 2. - a technique of tricking a user into clicking on something different from what the user perceives. (deprecated attack)
- 4. - A form of harassment or bullying inflicted through the use of electronic or communication devices such as computers, mobile phones, laptops, etc.
- 7. - is a type of malware that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- 8. - is software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user.
- 13. - is gaining unauthorized access to a computer system via another user's legitimate connection.
- 14. - is an effort to gather information about a computer or its users for the purpose of gaining unauthorized access later.
- 15. gap (networking) - It is a network security measure used on one or more computers to ensure the physical isolation of a secure computer network from unsecured networks, such as the public Internet or an unsecured local area network.
- 16. - attack in which a person or a program successfully identifies as another by falsifying a data.
- 19. (computing) - is a method of bypassing normal authentication procedures, usually through a network connection such as the Internet.
- 21. - is the theft of money from the card to your card, account, account in the payment system, as well as the purchase of goods using someone else's credit card. Most often, carders use cash withdrawals, the purchase of branded clothing or electronics.
- 23. – it refers to any video in which faces have been either swapped or digitally altered, with the help of AI.
- 25. - is the area of development that refers to the server-side development. It focuses on databases, scripting, and website architecture.
- 26. - is the area of development that refers to the client-side development. It is the development of the graphical user interface of a website.
- 27. (horse) - is a harmful program that misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it.
Down
- 1. - Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.
- 3. - when a person builds an online relationship with a young person and tricks or pressures him/ her into doing a sexual act.
- 5. request forgery (CSRF) - a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts. (also deprecated)
- 6. slicing - attack in which cyber-criminals steal money or resources a bit at a time so that there’s no noticeable difference in overall size.
- 9. - A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- 10. - is a form of attack that causes fragmentation in the general sequence of Internet Protocol (IP) packets and sends these fragmented packets to the victim’s machine that is attacked.
- 11. - type of fraud that uses mobile phone text messages to lure victims into calling back on a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone or web.
- 12. - Cryptojacking is the unauthorized use of computing resources to mine cryptocurrencies.
- 17. - is a cyberattack in which spam emails, or other forms of communication, are sent en masse, with the intention of tricking recipients into doing something that undermines their security or the security of the organization they work for.
- 18. - is a set of computer programs, usually malicious, designed to provide access to a computer or an area of its software that is otherwise prohibited.
- 20. (denial of service attack) - is a cyberattack in which a criminal wants to make a computer or network resource inaccessible to users by disrupting the services of a host connected to the network. Denial of service is usually achieved by filling a resource with redundant requests to overload systems and prevent legitimate requests from being executed.
- 22. - is a form of attack that causes fragmentation in the general sequence of Internet Protocol (IP) packets and sends these fragmented packets to the victim’s machine that is attacked.
- 24. - an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks.