Across
- 3. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
- 6. The ACSC's cyber security principles are grouped into four key activities:XXXX,protect,detect and respond.
- 7. An annoying malware that spams you with ads.
- 8. Settings on folders or files that control who is allowed to access them.
- 9. A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
- 12. What does the C stand for in the abbreviation AACA, as used in the Information Security Manual?
- 13. A malicious code typically disguised as a legitimate program.
- 14. Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
- 15. An important process that verifies a user is really who they are; many different ways this can be done.
Down
- 1. Full name of a DoS attack (three words).
- 2. The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
- 4. A collection of malware infested computers that form a network to attack.
- 5. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
- 9. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
- 10. In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
- 11. Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
- 14. An email that contains a message with a suspicious link designed to steal personal information.