Crosswords Cybersecurity
Across
- 3. is a set of modifications made to a computer program or its supporting data in order to update, correct, or improve it.
- 5. establishes a digital connection between your computer and a remote server belonging to a provider
- 7. malicious computer program used to give hackers unauthorized remote access to an infected computer by exploiting system vulnerabilities.
- 9. is one of the disciplines concerned with protecting messages (ensuring confidentiality, authenticity and integrity) often using secrets or keys.
- 10. It involves copying the magnetic stripes of a bank card using a memory reader
Down
- 1. a person who seeks ways to bypass software and hardware protections.
- 2. Malicious software that blocks access to the computer or files by encrypting them and demands a ransom payment from the victim to regain access.
- 4. Key a string of characters used within an encryption algorithm for altering data so that it appears random
- 6. a form of malware or hardware that tracks and records your keystrokes as you type
- 8. fraudulent technique that allows fraudsters to display a phone number that is not their own.