Cyber Security
Across
- 3. D______ of service
- 5. P_________ mails that try to trick users into giving away personal details.
- 7. Programs similar to viruses except that they are not hidden within other files
- 8. M_______ is malicious software that is designed to hack a system
- 9. Programs that monitor user activities (such as websites visited, usernames and passwords used)
- 10. B_____ force Where a program is used to find a password
Down
- 1. P______ - Where users do not adhere to network policy.
- 2. Programs that attempt to blackmail a user into making a payment to a hacker.
- 4. Programs embedded (hidden) within other files. They replicate themselves and become part of other programs.
- 6. Programs which pretend to be legitimate but in reality are malware.