1.4 Network Security

123456789101112131415161718
Across
  1. 2. Permissions assigned to a user defining what resources they can access.
  2. 4. Attempting to guess passwords by trying every possible combination.
  3. 6. A term for malicious software.
  4. 7. A self-replicating malware that spreads itself across networks, without user action.
  5. 8. A form of social engineering that involves maintaining a conversation.
  6. 10. Unauthorised access of data as it is being transmitted over a network.
  7. 14. A technique that exploits vulnerabilities in databases by injecting malicious code.
  8. 15. A type of malware that secretly monitors a user.
  9. 17. A form of social engineering that involves tricking people into sharing information through fake emails or websites.
  10. 18. A form of testing designed to find any weaknesses in a system.
Down
  1. 1. Observing someone's action, such as watching them enter their password.
  2. 3. Manipulating people into sharing sensitive/confidential information.
  3. 5. The process of scrambling data so it can only be read by authorised users.
  4. 9. A malicious program that replicates itself and attaches itself to files.
  5. 10. Overloading a network or website with traffic to make it unavailable.
  6. 11. A malicious program that disguises itself as legitimate software.
  7. 12. Malware that encrypts files and demands payment for decryption.
  8. 13. Should be at least 8 characters long with upper and lowercase letters.
  9. 16. Software or hardware that filters and blocks unauthorised access to a network.