Cyber Security Puzzle
Across
- 8. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
- 9. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- 10. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- 13. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- 14. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
- 16. An acronym that stands for distributed denial of service – a form of cyber-attack.
- 17. this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- 18. Refers to a company security policy that allows for employees’ personal devices to be used in business.
- 19. A defensive technology designed to keep the bad guys out. It can be hardware or software-based
- 21. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
- 22. Breaches the network to gain sensitive information with the owner’s consent – making it completely legal.
- 23. A type of malware that functions by spying on user activity without their knowledge.
Down
- 1. A technique used to manipulate and deceive people to gain sensitive and private information.
- 2. A group of computers, printers and devices that are interconnected and governed as a whole.
- 3. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
- 4. A Technique by which hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- 5. Hackers that break into the network to steal information that will be used to harm the owner or the users without consent. It’s entirely illegal.
- 6. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- 7. Another kind of malware that allows cybercriminals to remotely control your computer
- 11. An internet version of a home address for your computer, which is identified when it communicates over a network.
- 12. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
- 13. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- 15. An audio or video clip that has been edited and manipulated to seem real or believable
- 20. A set of programs that tell a computer to perform a task.
- 22. A piece of malware that can replicate itself in order to spread the infection to other connected computers