Across
- 2. unintentional actions - or lack of action - by employees and users that cause, spread or allow a security breach to take place.
- 7. a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
- 9. A hacker is a person skilled in information technology who achieves goals by non-standard means.
- 11. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 13. facts and statistics collected together for reference or analysis.
- 16. occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
- 18. the action of obtaining something by using persuasion or guile.
- 19. situation where the attacker can physically view the device screen and keypad to obtain personal information.
- 20. individuals that break the computing code of ethics, regulations, and laws for a malicious purpose.
- 21. all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons
- 22. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
- 1. any information that relates to an identified or identifiable living individual
- 3. The process of proving the claimed identity of an individual user, machine, software component or any other entity.
- 4. the process in which your software applies critical updates without seeking confirmation from a user.
- 5. when attackers attempt to trick users into doing 'the wrong thing', such as clicking a bad link that will download malware, or direct them to a dodgy website.
- 6. The authorization given to users that enables them to access specific resources on the network
- 8. facts provided or learned about something or someone.
- 10. an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
- 12. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- 14. a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems
- 15. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- 17. an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
