Cybersecurity
Across
- 2. Full name of a DoS attack (three words).
- 3. A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
- 5. The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
- 8. A collection of malware infested computers that form a network to attack (e.g. a DDoS attack).
- 10. (See xx) A set of cybersecurity threats that rely on a victim falling for a trap set for them (two words).
- 11. An important process that verifies a user is really who they are; many different ways this can be done.
- 12. An email that contains a message with a suspicious link designed to steal personal information.
- 16. An annoying malware that spams you with ads.
- 19. A name ... attack is a type of silly survey or quiz that actually harvests personal information from unaware users.
- 20. Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
- 23. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
- 24. I am not a robot.
- 26. Settings on folders or files that control who is allowed to access them.
- 28. A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly (first word only).
- 29. In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
- 30. A type of malware that records every single press of the keyboard that you make.
Down
- 1. When raw data is put into context and has meaning, the data transforms into ...
- 4. Hacking to try and champion a cause, e.g. climate change, rather than to steal information.
- 6. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
- 7. See clue xx.
- 9. An example would be an email from a Nigerian prince asking you to send your name, address, contact number and bank details to him reportedly so you can receive many millions of dollars.
- 10. Stealing information from someone simply by looking from behind them.
- 12. A ... is created about a user based on data - for example, personal data, shopping habits, etc. - in order to better target that user.
- 13. Malicious code intended to monitor your activity without your permission.
- 14. Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
- 15. Gaining unauthorised access to or control of a computer system.
- 17. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
- 18. ... authentication requires an additional method of checking that it is really you trying to interface with another system (two words).
- 21. A malicious code typically disguised as a legitimate program.
- 22. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known.
- 25. Protection for a network by monitoring and controlling traffic that passes through it.
- 27. The general term for programs that gains access to your system for unethical reasons, e.g. to steal data, cause system damage, send you spam, etc.