Cyber Security

123456789101112
Across
  1. 3. The process or techniques used to analyse large sets of existing information to discover previously unrevealed patterns or correlations. (2)
  2. 6. It is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
  3. 7. A record showing who has accessed an IT system and what operations the user has performed during a given period. It is a chronological record that reconstructs and examines the sequence of activities surrounding or leading to a specific operation, procedure, or event in a security relevant transaction from inception.(2)
  4. 9. A field concerned with designing and developing artificial intelligence algorithms for automated knowledge discovery and innovation by information systems. (2)
  5. 10. A measurable, physical characteristic or personal behavioral trait by a human being that is used to recognize the identity, or verify the claimed identity, for authentication purposes. Example: Facial images
  6. 11. E-mail that is not requested. Also known as “unsolicited commercial e-mail” (UCE), “unsolicited bulk e-mail” (UBE), “gray mail” and just plain “junk mail”.
  7. 12. A _______ is a network security system designed to prevent unauthorized access to or from a private network. It is a gateway that limits access between networks in accordance with local security policy.
Down
  1. 1. Tricking individuals into disclosing sensitive personal information through deceptive computer-based means, such as through specially crafted emails. It is the use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website.
  2. 2. These are messages that web servers pass to your web browser when you visit internet sites. Your browser stores each message in a small file and when you request another page from the server, your browser sends the cookie back to the server.
  3. 3. A __________ is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. The digital equivalent of a handwritten signature or stamped seal, a digital signature offers far more inherent security, and it is intended to solve the problem of tampering and impersonation in digital communications. (2)
  4. 4. A model for enabling on-demand network access to a shared pool of configurable IT capabilities/ resources (e.g., networks, servers, storage) that can be rapidly provisioned and released with minimal management effort or service provider interaction. (2)
  5. 5. It a software that disrupts normal computer functions or sends a user’s personal data without the user’s authorization.
  6. 8. They are programs that claim to perform one function but do another, typically malicious. They can take the form of attachments, downloads, and fake videos/programs.