Across
- 2. A technology that allows us to access our files and/or services through the internet from anywhere in the world. Technically speaking, it’s a collection of computers with large storage capabilities that remotely serve requests.
- 4. A group of computers, printers and devices that are interconnected and governed as a whole. For example, your computer is usually part of a domain at your workplace.
- 5. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- 8. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- 9. Another kind of malware that allows cybercriminals to remotely control your computer. Phishing A technique used by hackers to obtain sensitive information.
- 11. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
- 12. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker or “bot-herder”.
- 13. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer. Common forms include: viruses, trojans, worms and ransomware.
- 14. A piece of malware that can replicate itself in order to spread the infection to other connected computers.
- 15. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- 17. A type of malware that functions by spying on user activity without their knowledge. The capabilities include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.
Down
- 1. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- 3. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.
- 6. A set of programs that tell a computer to perform a task. These instructions are compiled into a package that users can install and use. For example, Microsoft Office is an application software.
- 7. A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
- 10. An internet version of a home address for your computer, which is identified when it communicates over a network
- 11. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
- 16. Refers to a company security policy that allows for employees’ personal devices to be used in business.
