Across
- 3. a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- 5. the process of converting information or data into a code, especially to prevent unauthorized access.
- 6. a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
- 7. this is meant to shut down a machine or network, making it inaccessible to its intended users.
- 11. An attack, via cyberspace, targeting an enterprise's use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.
- 13. an incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner.
- 15. a cyber attack targeting a software vulnerability which is unknown to the software vendor or to antivirus vendors.
- 16. a reward offered to a person who identifies an error or vulnerability in a computer program or system.
Down
- 1. a newly established web site that encourages hacking in order to learn and protect against it.
- 2. a large-scale cyber attack carried out by malware-infected devices which are controlled remotely.
- 4. the use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.
- 8. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 9. the process or action of proving or showing something to be true, genuine, or valid.
- 10. a person who uses computers to gain unauthorized access to data.
- 12. a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- 14. a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation
