Cyber security
Across
- 7. An example is a key logger
- 8. Type of test where someone tries to hack into a network
- 11. Physical features used to authenticate users
- 12. Finding login details by watching someone enter them
Down
- 1. Using a scenario to persuade a victim to divulge information
- 2. Hidden inside legitimate looking software
- 3. Using fake emails to gain information
- 4. A physical attribute used to authenticate a user
- 5. Any kind of malicious program
- 6. A form of challenge-response test to check that a user is human
- 8. Redirection to a fake website
- 9. Used when logging into a computer or network
- 10. Requires user action to spread