1.4 Network Security

123456789101112131415161718
Across
  1. 2. A type of malware that secretly monitors a user.
  2. 6. Malware that encrypts files and demands payment for decryption.
  3. 8. The process of scrambling data so it can only be read by authorised users.
  4. 11. Unauthorised access of data as it is being transmitted over a network.
  5. 12. A form of testing designed to find any weaknesses in a system.
  6. 14. Overloading a network or website with traffic to make it unavailable.
  7. 15. A malicious program that disguises itself as legitimate software.
  8. 17. A technique that exploits vulnerabilities in databases by injecting malicious code.
  9. 18. Should be at least 8 characters long with upper and lowercase letters.
Down
  1. 1. A form of social engineering that involves maintaining a conversation.
  2. 2. Manipulating people into sharing sensitive/confidential information.
  3. 3. A malicious program that replicates itself and attaches itself to files.
  4. 4. Permissions assigned to a user defining what resources they can access.
  5. 5. A self-replicating malware that spreads itself across networks, without user action.
  6. 7. A form of social engineering that involves tricking people into sharing information through fake emails or websites.
  7. 9. Attempting to guess passwords by trying every possible combination.
  8. 10. A term for malicious software.
  9. 13. Observing someone's action, such as watching them enter their password.
  10. 16. Software or hardware that filters and blocks unauthorised access to a network.