Puzzle - 2
Across
- 3. encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
- 6. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- 8. involves tricking someone into clicking on one object on a web page while they think they are clicking on another.
- 9. weaknesses in software programs that can be exploited by hackers to compromise computers.
- 10. a type of internet fraud that seeks to acquire a user’s credentials by deception.
Down
- 1. the use of online ads to distribute malicious programs. Cybercriminals embed a special script in a banner, or redirect users who click on an ad to a special page containing code for downloading malware.
- 2. the process of decoding cipher text to plain text, so it is readable by humans.
- 4. a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
- 5. a form of malicious code that looks like a legit file, program or application, but actually is designed to control the user's computer and data
- 7. Cryptocurrency, a form of electronic cash