Threats to Cyber Secruity
Across
- 4. Shoulder surfing, direct observation techniques like looking over a shoulder
- 8. Scamming practise where malicious code is installed on to a personal computer record are modified and misdirects users to fraudulent websites
- 9. The art of manipulating people so they give up their personal information
- 11. Appears to be something wanted but is a standalone malicious software designed to give full control of the PC
- 12. Spyware that logs keys used and collets data from affected computer
- 13. Encourages users to enter confidential data by pretending to be a trust worthy source
- 15. Usually popups, main aim to generate revenue for author
Down
- 1. Types of malware installed on computer system that collects information without user being aware, is hidden and secretly installed
- 2. Self-replicating program that attaches onto to existing programs and can easily spread
- 3. The acts of using and creating an invented scenario to engage victim into giving the information
- 5. Making the computer or network unavailable to user (DoS)
- 6. Loss or theft of devices
- 7. The term to describe the protection of information systems from theft unauthorised access or damage to hardware, software and information on them
- 10. Standalone computer program that replicates itself so it can spread onto a network. Does NOT attach to a program
- 14. Finding a weakness in an established system