Cyber Security

123456789101112
Across
  1. 3. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
  2. 4. A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
  3. 6. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  4. 9. A security measure designed to verify an individual`s authorization to access computer or security information.
  5. 11. A piece of malware that can replicate itself in order to spread the infection to other connected computers.
  6. 12. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
  1. 1. An environment in which digitized information is distributed on networks of computers.
  2. 2. The largest WAN in the world.
  3. 5. A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
  4. 7. Shift cipher named after a famous Roman, Julius ?
  5. 8. Machine used in WW2 to send secret messages in Germany.
  6. 10. Statement of intention to inflict damage or hostile action.