Information Technology Crossword Puzzle 64 - Cybersecurity
Across
- 5. Is software that has been created to intentionally cause damage
- 6. Involves malicious human interaction where people don’t tell the truth and they manipulate others to divulge personal information
- 8. Pay attention to these that don’t have content or look like they are coming from a spoofed address
- 9. Is an act of masquerading as a valid entity through falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain
- 10. Is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
Down
- 1. A type of malware that infects a network or steals confidential data and then demands something (typically currency of some sort) in exchange for access to systems
- 2. Running these often will keep applications current and help protect your computer
- 3. Is the act of surreptitiously listening to a private computer "conversation" (communication), typically between hosts on a network
- 4. Hackers throw a line out there hoping that someone will bite, and when they do, the hacker steals sensitive information like passwords, credit card numbers and more
- 7. Holding on to the same usage of this for ages isn’t a great idea