Cyber security

123456789101112131415
Across
  1. 3. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
  2. 6. The ACSC's cyber security principles are grouped into four key activities:XXXX,protect,detect and respond.
  3. 7. An annoying malware that spams you with ads.
  4. 8. Settings on folders or files that control who is allowed to access them.
  5. 9. A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
  6. 12. What does the C stand for in the abbreviation AACA, as used in the Information Security Manual?
  7. 13. A malicious code typically disguised as a legitimate program.
  8. 14. Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
  9. 15. An important process that verifies a user is really who they are; many different ways this can be done.
Down
  1. 1. Full name of a DoS attack (three words).
  2. 2. The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
  3. 4. A collection of malware infested computers that form a network to attack.
  4. 5. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
  5. 9. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
  6. 10. In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
  7. 11. Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
  8. 14. An email that contains a message with a suspicious link designed to steal personal information.