Ethical Hacking
Across
- 1. is the practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
- 8. refers to any access or action that is not permitted or approved, usually involving someone trying to enter systems or data without permission.
- 9. means having the intention to cause harm. In tech, it describes software or behavior designed to damage or disrupt systems or steal data.
- 10. are individuals who gain access to systems or networks, often bypassing security measures. They can be malicious (black-hat), ethical (white-hat), or somewhere in between (gray-hat).
- 11. is a type of malware that locks or encrypts a victim’s data and demands payment (a ransom) to restore access.
- 12. is any potential danger or risk that could exploit a vulnerability to harm a system, network, or organization.
Down
- 2. is someone who commits crimes through the internet or using computers, often for financial gain, data theft, or sabotage.
- 3. are a type of malware that attach themselves to legitimate programs or files and spread when those files are opened, often damaging systems or data.
- 4. refers to criminal activities carried out using computers or the internet, such as hacking, identity theft, or spreading malware.
- 5. refers to information that is stored and processed by computers. It can include text, images, videos, or any other type of digital content.
- 6. (short for malicious software) is any software designed to harm, exploit, or otherwise compromise a computer, system, or network.
- 7. is an incident where unauthorized individuals gain access to data, systems, or networks, often resulting in data loss, theft, or compromise.