Across
- 1. A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
- 2. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
- 3. A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use. For example, Microsoft Office is an application software.
- 5. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
- 7. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- 11. Refers to a company security policy that allows for employees’ personal devices to be used in business. A BYOD policy sets limitations and restrictions on whether or not a personal phone or laptop can be connected over the corporate network.
- 13. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
- 14. A group of computers, printers and devices that are interconnected and governed as a whole. For example, your computer is usually part of a domain at your workplace.
- 15. An internet version of a home address for your computer, which is identified when it communicates over a network; For example, connecting to the internet (a network of networks).
- 16. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- 18. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
Down
- 1. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- 4. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
- 6. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker or “bot-herder”.
- 8. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- 9. A piece of malware that can replicate itself in order to spread the infection to other connected computers.
- 10. A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
- 11. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- 12. Another kind of malware that allows cybercriminals to remotely control your computer. Rootkits are especially damaging because they are hard to detect, making it likely that this type of malware could live on your computer for a long time.
- 17. A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
