Across
- 1. Block of data transmitted across a network
- 3. Software that can harm a system
- 4. Part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- 8. Type of cyber attack where data is kept from the victim until a price is paid to the hacker
- 9. Base-10 number system
- 12. The fourth phase of ethical hacking
- 15. The second phase of ethical hacking
- 17. Malware that functions by spying on user activity without their knowledge
- 19. The third phase of ethical hacking
- 21. Process of encoding data to prevent theft
- 22. Malware that can replicate itself to spread to other connected computers
- 23. System for connecting a number of computer systems to form a local area network
- 24. Performs tasks on command, allowing attackers to remotely control an affected computer
Down
- 2. Operation of joining character strings end-to-end
- 5. Hidden details of a system or a process, allowing the user to focus on the details that are important for the task at hand
- 6. Type of malware that corrupts and spreads between victims
- 7. Software that takes advantage of a flaw in a computer system
- 9. Subset of the internet with addresses sharing a common suffix
- 10. Base-2 number system
- 11. Base-16 number system
- 13. The first phase of ethical hacking
- 14. Type of cyber attack where attacker attempts to trick the victim into giving them information
- 16. The creation of a child process from a parent process
- 18. Attack where hacker injects false training data to corrupt the learning model
- 20. Input value to a command