Cyber-security edexcel

123456789101112131415161718192021
Across
  1. 4. a _____ attack is where a hacker attempts to steal user information, usually in the format of a fake login screen.
  2. 5. malware that spies on the user discreetly
  3. 7. an electronic attack on a computer system
  4. 9. updates are sometimes referred to as ______
  5. 10. often, the weakest link in a computer system is the ______
  6. 12. A backup that only backs up what changed is called an ________ backup
  7. 14. companies will often a strict backup ______
  8. 15. the preferred currency of hackers as it is decentralized
  9. 17. software that attempts to remove potential malware from your computer
  10. 19. is what anti-malware does to identify malware by its behaviour
  11. 20. a type of software that logs all keys to a file
  12. 21. ____ pro quo is latin for "this for that" and in CS is where the victim is offered a benefit for using the software
Down
  1. 1. ________ encryption is where something is encrypted and decrypted with the same key
  2. 2. _______ software is software that is not up to date and could be vulnerable to attacks
  3. 3. The type of malware that holds the user's files ransom (encrypted) until they pay
  4. 6. any type of software that is designed to harm the computer it is installed on.
  5. 8. a malicious piece of software that will self replicate
  6. 11. anti malware software recognises malware based on the definitions or _______
  7. 13. a malicious piece of software that acts as another piece of software to get the user to install it.
  8. 16. encrypted plain text is referred to as ____ text
  9. 18. social ________ is where the hacker will convince someone to give them access to the computer system