Word List
Across
- 1. a type of malware that encrypts data on victim’s computer and demands ransom for the encryption key
- 7. evil which is commited by hackers every day
- 10. is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
- 11. person who can intrude the system
- 13. the process of encoding information
- 15. characteristics or information
- 16. a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm
- 19. two-dimensional barcode
- 20. the utility that lets the hacker to trace the data of user's device
- 21. to destroy the secret of the data
- 22. the domain that lets the hacker trace the personal geolocation.
Down
- 2. a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software
- 3. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
- 4. computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability
- 5. situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
- 6. to kidnap the data
- 7. any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices
- 8. a type of cyberattack that targets casual users. The main goal of this cybercrime is to get login information of a user
- 9. the most popular remote access trojan
- 12. the global system of interconnected computer networks
- 14. case of programms for interacting with wireless networks
- 17. to get the data in a dishonest way
- 18. critical system error on Windows