THREATS/SOLUTIONS ONLINE

1234567891011121314151617181920
Across
  1. 2. EMAILS WHICH ARE NOT REQUESTED
  2. 3. TRACKS USERS DATA ENTRY
  3. 4. DISPLAYS ADVERTS REPEATEDLY
  4. 5. THIS SHOULD BE CHANGED OFTEN AND CONTAIN LETTERS,SYMBOLS AND NUMBERS
  5. 7. THIS MUST MATCH A GIVEN PASSWORD TO GAIN ACCESS TO A SYSTEM
  6. 10. USES A WEBSITE WHICH IS VERY SIMILAR TO THE ORIGINAL
  7. 13. CAN MAKE USERS ANONYMOUS BY CREATING A NEW IP.
  8. 16. VIRUS SOFTWARE DATABASE SHOULD BE THIS
  9. 17. USE OF A FRAUDULENT EMAIL
  10. 18. A REASON HACKERS HACK
  11. 19. THESE SHOULD BE RUN DAILY TO CHECK FOR VIRUSES
  12. 20. THIS IS NEEDED TO DECODE SCRAMBLED DATA
Down
  1. 1. CAN ENTER SYSTEM VIA SOFTWARE INSTALLATION
  2. 2. THESE CAN BE CHANGED BY MALWARE
  3. 3. A EXAMPLE OF ENCRYPTION
  4. 6. LINK ON AN EMAIL AND A POSSIBLE SOURCE OF A VIRUS
  5. 7. COMPUTER IS TRICKED INTO THINKING THIS IS GENUINE
  6. 8. DETAILS OFTEN ASKED TO CHANGE WHEN PHISHING IS USED
  7. 9. A PIECE OF CODE THAT INFECTS A SYSTEM
  8. 11. SOMETHING ON A SYSTEM A VIRUS COULD AFFECT
  9. 12. A TYPE OF DATA HACKERS MAY STEAL
  10. 13. THIS IS AFFECTED WHEN A VIRUS INFECTS A SYSTEM
  11. 14. THE CODING/SCRAMBLING OF DATA
  12. 15. PROTECTION BETWEEN A LAN AND WAN