Cyber Security Puzzle

1234567891011121314151617181920212223
Across
  1. 8. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
  2. 9. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  3. 10. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  4. 13. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  5. 14. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
  6. 16. An acronym that stands for distributed denial of service – a form of cyber-attack.
  7. 17. this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
  8. 18. Refers to a company security policy that allows for employees’ personal devices to be used in business.
  9. 19. A defensive technology designed to keep the bad guys out. It can be hardware or software-based
  10. 21. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  11. 22. Breaches the network to gain sensitive information with the owner’s consent – making it completely legal.
  12. 23. A type of malware that functions by spying on user activity without their knowledge.
Down
  1. 1. A technique used to manipulate and deceive people to gain sensitive and private information.
  2. 2. A group of computers, printers and devices that are interconnected and governed as a whole.
  3. 3. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
  4. 4. A Technique by which hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
  5. 5. Hackers that break into the network to steal information that will be used to harm the owner or the users without consent. It’s entirely illegal.
  6. 6. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  7. 7. Another kind of malware that allows cybercriminals to remotely control your computer
  8. 11. An internet version of a home address for your computer, which is identified when it communicates over a network.
  9. 12. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
  10. 13. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  11. 15. An audio or video clip that has been edited and manipulated to seem real or believable
  12. 20. A set of programs that tell a computer to perform a task.
  13. 22. A piece of malware that can replicate itself in order to spread the infection to other connected computers