Cybersecurity crossword

12345678910111213141516171819202122232425
Across
  1. 2. company security policy that allows for employees’ personal devices to be used in business.
  2. 3. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others
  3. 5. malware that functions by spying on user activity without their knowledge.
  4. 8. technology that allows access to files/services through the internet from anywhere in the world.
  5. 9. acronym that stands for distributed denial of service – a form of cyber attack.
  6. 12. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  7. 13. A piece of malware that often allows a hacker to gain remote access to a computer through a back door
  8. 14. software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
  9. 15. udio or video clip that has been edited and manipulated to seem real or believable
  10. 17. internet version of a home address for your computer
  11. 19. hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  12. 20. defensive technology designed to keep the bad guys out
  13. 22. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and networ
  14. 23. umbrella term that describes all forms of malicious software
  15. 24. tool that allows the user to remain anonymous while using the internet
  16. 25. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
  1. 1. malware that allows cybercriminals to remotely control your computer.
  2. 4. technique used to manipulate and deceive people to gain sensitive and private information
  3. 6. form of malware that deliberately prevents you from accessing files on your computer – holding your data hostag
  4. 7. group of computers, printers and devices that are interconnected and governed as a whole
  5. 10. set of programs that tell a computer to perform a task
  6. 11. Breaches the network to gain sensitive information with the owner’s consent
  7. 16. this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
  8. 18. technique used by hackers to obtain sensitive information.
  9. 21. piece of malware that can replicate itself in order to spread the infection to other connected computers