cyber_cross

12345678910111213
Across
  1. 5. a technique of hiding information within other, seemingly innocuous files, such as images, audio, or video files.
  2. 6. is a general term for any type of intrusive computer software with malicious intent against the user.
  3. 9. decoding cipher text to plain text
  4. 10. a type of internet fraud that seeks to acquire a user’s credentials by deception
  5. 12. attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
  6. 13. additional, revised or updated code for an operating system or application.
Down
  1. 1. encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals (2 words)
  2. 2. a type of cyberattack where an attacker secretly uses someone else’s device to mine cryptocurrency without their permission.
  3. 3. the process of verifying the identity of a user or piece of information and the veracity of the information provided.
  4. 4. a cyberattack that redirects users from a legitimate website to a fraudulent one without their knowledge, even if they type in the correct web address. This is typically done by corrupting the website’s DNS (Domain Name System) settings.
  5. 7. a hacker successfully breaching a network or device to gain access to it's files and data ( 2 words )
  6. 8. a cybersecurity threat that involves registering domain names similar to legitimate ones, often with minor typos , Attackers use these lookalike domains to trick users into visiting fake websites
  7. 11. extends a private network across a public network,a virtual secure network
  8. 12. unsolicited emails,the email equivalent of physical junk mail delivered through the post.