1.4 Network Security

123456789101112131415161718
Across
  1. 2. Malware that encrypts files and demands payment for decryption.
  2. 7. A self-replicating malware that spreads itself across networks, without user action.
  3. 8. Observing someone's action, such as watching them enter their password.
  4. 9. A type of malware that secretly monitors a user.
  5. 10. Software or hardware that filters and blocks unauthorised access to a network.
  6. 11. Unauthorised access of data as it is being transmitted over a network.
  7. 15. A form of social engineering that involves maintaining a conversation.
  8. 16. Should be at least 8 characters long with upper and lowercase letters.
  9. 17. A form of testing designed to find any weaknesses in a system.
  10. 18. A technique that exploits vulnerabilities in databases by injecting malicious code.
Down
  1. 1. Attempting to guess passwords by trying every possible combination.
  2. 3. Manipulating people into sharing sensitive/confidential information.
  3. 4. Overloading a network or website with traffic to make it unavailable.
  4. 5. Permissions assigned to a user defining what resources they can access.
  5. 6. The process of scrambling data so it can only be read by authorised users.
  6. 12. A malicious program that disguises itself as legitimate software.
  7. 13. A term for malicious software.
  8. 14. A malicious program that replicates itself and attaches itself to files.
  9. 17. A form of social engineering that involves tricking people into sharing information through fake emails or websites.