Across
- 3. / An unauthorized person seeking to maliciously disrupt or damage a system
- 5. / A string of letters, characters and numbers that must be used to gain access to a device, system or service
- 6. / Global system interconnected computer networks that uses standard communication protocol
- 8. / A characteristics or specific weakness that renders an organization or asset open to exploitation
- 10. / Never scribble private and confidential --------------- on desktop table or beneath the keyboard
- 12. / Malicious software that is inserted in your system, usually covertly, with an intent on compromising victim’s data
Down
- 1. / Unwanted and fraudulent e-mails, messages and advertisements that comes to your e-mail address
- 2. / Hardware and/or Software mechanism to prevent unauthorized users from accessing a computer network
- 4. / system invented by google that uses a test to establish if a user is human or robot
- 7. / A type of malware designed to block access to a system or service data until a sum of money is paid
- 8. / A tool that allows the user to remain anonymous while using internet by masking the location and encrypting traffic
- 9. / Always ---------- your computer when you leave your desk
- 11. / Cyber attack in which cyber criminals flood the network which make machine or network resource are unavailable to legitimate users
- 13. / Encoding information into ciphertext to assure that the confidentiality of, and access to, certain information about an entity is protected
