Across
- 2. Permissions assigned to a user defining what resources they can access.
- 4. Attempting to guess passwords by trying every possible combination.
- 6. A term for malicious software.
- 7. A self-replicating malware that spreads itself across networks, without user action.
- 8. A form of social engineering that involves maintaining a conversation.
- 10. Unauthorised access of data as it is being transmitted over a network.
- 14. A technique that exploits vulnerabilities in databases by injecting malicious code.
- 15. A type of malware that secretly monitors a user.
- 17. A form of social engineering that involves tricking people into sharing information through fake emails or websites.
- 18. A form of testing designed to find any weaknesses in a system.
Down
- 1. Observing someone's action, such as watching them enter their password.
- 3. Manipulating people into sharing sensitive/confidential information.
- 5. The process of scrambling data so it can only be read by authorised users.
- 9. A malicious program that replicates itself and attaches itself to files.
- 10. Overloading a network or website with traffic to make it unavailable.
- 11. A malicious program that disguises itself as legitimate software.
- 12. Malware that encrypts files and demands payment for decryption.
- 13. Should be at least 8 characters long with upper and lowercase letters.
- 16. Software or hardware that filters and blocks unauthorised access to a network.
