Puzzle - 3
Across
- 3. The core of a computer's operating system that houses the most essential functions of the computer
- 4. is an attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
- 7. the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
- 8. a type of malware that is aimed to infect and harm a file, a system or a network
- 9. a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
Down
- 1. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- 2. a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
- 5. Customizable additions to software for extra functionality
- 6. string of characters used to verify the identity of an user during the authentication process
- 9. a program that can automatically perform some simple repeated task to reach a pursued goal.