Cyber Security

123456789101112131415161718192021222324
Across
  1. 1. Block of data transmitted across a network
  2. 3. Software that can harm a system
  3. 4. Part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  4. 8. Type of cyber attack where data is kept from the victim until a price is paid to the hacker
  5. 9. Base-10 number system
  6. 12. The fourth phase of ethical hacking
  7. 15. The second phase of ethical hacking
  8. 17. Malware that functions by spying on user activity without their knowledge
  9. 19. The third phase of ethical hacking
  10. 21. Process of encoding data to prevent theft
  11. 22. Malware that can replicate itself to spread to other connected computers
  12. 23. System for connecting a number of computer systems to form a local area network
  13. 24. Performs tasks on command, allowing attackers to remotely control an affected computer
Down
  1. 2. Operation of joining character strings end-to-end
  2. 5. Hidden details of a system or a process, allowing the user to focus on the details that are important for the task at hand
  3. 6. Type of malware that corrupts and spreads between victims
  4. 7. Software that takes advantage of a flaw in a computer system
  5. 9. Subset of the internet with addresses sharing a common suffix
  6. 10. Base-2 number system
  7. 11. Base-16 number system
  8. 13. The first phase of ethical hacking
  9. 14. Type of cyber attack where attacker attempts to trick the victim into giving them information
  10. 16. The creation of a child process from a parent process
  11. 18. Attack where hacker injects false training data to corrupt the learning model
  12. 20. Input value to a command