Cyber Security
Across
- 1. Verifying the identity of a user, process or device before allowing access to resources in a system.
- 2. The conversion of electronic plaintext data into unreadable ciphertext using algorithms. It protects the confidentially of data.
- 3. Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people.
- 6. engineering The methods used to manipulate people into carrying out specific actions, or divulging information.
- 7. A small text file that is transmitted by a website and stored in the user's web browser, to identify the user and prepare customized webpages. It can be used to track a user’s activity while browsing the internet.
- 8. A fraudulent scheme performed by a dishonest or deceitful individual, group, or company, in an attempt to obtain money or something else of value.
Down
- 1. A security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features.
- 4. Untargeted, mass emails sent to many people asking for sensitive information (such as bank details), encouraging them to open a malicious attachment, or visit a fake website that will ask the user to provide sensitive information or download malicious content.
- 5. A method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge (something they know: a password), possession (something they have: a code sent to a mobile phone), and inherence (something they are: a thumb print).