Puzzle - 10
Across
- 2. a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
- 5. a network security system that filters unsanctioned incoming and outgoing traffic.
- 6. Refers to a program that is run entirely from the network, without requiring any installation of software on the endpoint device running the program
- 7. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- 10. the use of online ads to distribute malicious programs. Cybercriminals embed a special script in a banner, or redirect users who click on an ad to a special page containing code for downloading malware.
Down
- 1. a term commonly used to describe a person who tries to gain unauthorized access into a network or computer system.
- 3. involves tricking someone into clicking on one object on a web page while they think they are clicking on another.
- 4. Customizable additions to software for extra functionality
- 8. Computing recourses that make it available to access your files and services through the internet from any point in the world.
- 9. contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.