Cyber Security

12345678910111213141516171819202122232425
Across
  1. 3. Base-10 number system
  2. 5. Subset of the internet with addresses sharing a common suffix
  3. 7. Base-16 number system
  4. 8. Performs tasks on command, allowing attackers to remotely control an affected computer
  5. 9. Part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  6. 10. Malware that can replicate itself to spread to other connected computers
  7. 12. Input value to a command
  8. 15. Malware that functions by spying on user activity without their knowledge
  9. 17. Process of encoding data to prevent theft
  10. 19. Block of data transmitted across a network
  11. 21. Type of cyber attack where attacker attempts to trick the victim into giving them information
  12. 22. Type of malware that corrupts and spreads between victims
  13. 23. System for connecting a number of computer systems to form a local area network
  14. 24. The second phase of ethical hacking
  15. 25. Type of cyber attack where data is kept from the victim until a price is paid to the hacker
Down
  1. 1. The third phase of ethical hacking
  2. 2. Software that can harm a system
  3. 4. Operation of joining character strings end-to-end
  4. 6. Base-2 number system
  5. 11. The first phase of ethical hacking
  6. 13. The fourth phase of ethical hacking
  7. 14. Software that takes advantage of a flaw in a computer system
  8. 16. Attack where hacker injects false training data to corrupt the learning model
  9. 18. Hidden details of a system or a process, allowing the user to focus on the details that are important for the task at hand
  10. 20. The creation of a child process from a parent process