Threats and Solutions

12345678910111213141516171819202122232425262728
Across
  1. 3. the act of luring a person out by someone posting a legitimate institution to trap individuals into providing credit card data, banking and passwords
  2. 4. a name that uniquely identifies an individual on a computer system
  3. 10. theft is the act of someone using your personal information and pretending to be you
  4. 11. is an insidious activity-monitoring software program that give hackers access to your personal data
  5. 15. this is a type of monitoring that uses a system that constantly monitors a computer network for slow or failing components
  6. 16. a term used to describe illegal and covert theft to gain a business advantage
  7. 19. of service an attack meant to shut down a machine or network, allowing the rightful user to have access to it
  8. 22. by someone posting a legitimate institution to lure individuals into providing credit card data, banking and passwords
  9. 23. a type of malicious code or software that looks legitimate but can take control of your computer
  10. 25. a type of scam practice in which a hostile code is installed on a PC or server that leads users to fraud websites without their consent
  11. 26. a word, phrase or string of characters with the main purpose of authenticating a user on a computer system
  12. 28. a program that helps workers learn specific knowledge or skills to improve performance in their current roles
Down
  1. 1. a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
  2. 2. a kind of software used to detect, prevent, scan, detect and terminate computer viruses
  3. 5. a method to protect digital information, by scrambling it as it travels across the Internet
  4. 6. a large number of internet-connected devices from which each is running one or more bots
  5. 7. card threat is the unauthorized use of a credit or debit card, or similar payment tool to fraudulently obtain money or property.
  6. 8. solutions is a type of system built end-to-end for a customer that can be easily implemented into a current business process
  7. 9. a type of malware that spreads copies of itself from computer to computer
  8. 12. an electronic device that is designed to detect and measure movement
  9. 13. a software that prevents unauthorized access to or from a network by controlling incoming and outgoing traffic as well as data packets, based on security rules given
  10. 14. a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another
  11. 17. bomb is a piece of often-malicious code that is intentionally inserted into software
  12. 18. is a technological system that uses specific data and mathematical algorithms for identification and is typically found in the latest models of smartphones
  13. 20. the collective name for a number of malicious software variants, including viruses, ransomware and spyware
  14. 21. also known as sniffing or snooping and it typically occurs over a network in which traffic is not secured or encrypted
  15. 24. an unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information
  16. 27. any kind of undesired, unsolicited digital communication, that gets sent out as part of a larger collection of messages