Information Security

12345678910
Across
  1. 3. techniques are cons (Schwindel) conducted through technology. The goal is to trick someone into giving up money, information, or valuables through manipulation and false promises.
  2. 5. Scrambles data, making it essentially unreadable to any program that doesn’t have the descrambling password, known as key. Even if copied or stolen.
  3. 6. bad guys, also known as “crackers”
  4. 7. One of the malevolent goals. Software that secretly monitors user actions, network traffic, or scans for files
  5. 9. networks of infiltrated and compromised machines controlled by a central command
  6. 10. seeks to compromise a computing system without permission. There are many forms of Malware for instance Viruses, Worms, Trojans
Down
  1. 1. good guys, probe for weaknesses, but don’t exploit them. They share their knowledge so that holes can be found & plugged hence security improves. They are part of the company auditing & security process
  2. 2. examines traffic as it enters and leaves the network, potentially blocking certain types of access, while permitting approved communication
  3. 4. hackers use psychology (exploit trust or curiosity) rather than code to trick employees into revealing information or performing other tasks that compromise a firm.
  4. 8. effectively shutting down Websites by overwhelming them with a crushing load of seemingly legitimate requests sent simultaneously by thousands of machines.