Threats and Solutions
Across
- 3. the act of luring a person out by someone posting a legitimate institution to trap individuals into providing credit card data, banking and passwords
- 4. a name that uniquely identifies an individual on a computer system
- 10. theft is the act of someone using your personal information and pretending to be you
- 11. is an insidious activity-monitoring software program that give hackers access to your personal data
- 15. this is a type of monitoring that uses a system that constantly monitors a computer network for slow or failing components
- 16. a term used to describe illegal and covert theft to gain a business advantage
- 19. of service an attack meant to shut down a machine or network, allowing the rightful user to have access to it
- 22. by someone posting a legitimate institution to lure individuals into providing credit card data, banking and passwords
- 23. a type of malicious code or software that looks legitimate but can take control of your computer
- 25. a type of scam practice in which a hostile code is installed on a PC or server that leads users to fraud websites without their consent
- 26. a word, phrase or string of characters with the main purpose of authenticating a user on a computer system
- 28. a program that helps workers learn specific knowledge or skills to improve performance in their current roles
Down
- 1. a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
- 2. a kind of software used to detect, prevent, scan, detect and terminate computer viruses
- 5. a method to protect digital information, by scrambling it as it travels across the Internet
- 6. a large number of internet-connected devices from which each is running one or more bots
- 7. card threat is the unauthorized use of a credit or debit card, or similar payment tool to fraudulently obtain money or property.
- 8. solutions is a type of system built end-to-end for a customer that can be easily implemented into a current business process
- 9. a type of malware that spreads copies of itself from computer to computer
- 12. an electronic device that is designed to detect and measure movement
- 13. a software that prevents unauthorized access to or from a network by controlling incoming and outgoing traffic as well as data packets, based on security rules given
- 14. a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another
- 17. bomb is a piece of often-malicious code that is intentionally inserted into software
- 18. is a technological system that uses specific data and mathematical algorithms for identification and is typically found in the latest models of smartphones
- 20. the collective name for a number of malicious software variants, including viruses, ransomware and spyware
- 21. also known as sniffing or snooping and it typically occurs over a network in which traffic is not secured or encrypted
- 24. an unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information
- 27. any kind of undesired, unsolicited digital communication, that gets sent out as part of a larger collection of messages