Cyber Security

12345678910111213141516171819
Across
  1. 3. A security system that monitors and controls incoming and outgoing data , can inspect to see if suspicious
  2. 6. A cyber attack intended to redirect a website's traffic to another, fake site.
  3. 7. A reason why a password may be easy to guess and weak
  4. 8. Code which downloads and displays adverts
  5. 9. Measurements and calculations for human characteristics and the body
  6. 11. If a mac address is on this, it will be able to access the system
  7. 14. A type of hacker who gains access to data without permission and with the intent to harm the data
  8. 16. Physical viewing an others sensitive information,by looking at people entering personal information onto a computer or a cash machine
  9. 18. Code that is capable of copying itself to damage or destroy data
  10. 19. A program that appears safe but is malicious and is designed to harm data. Installed by the user
Down
  1. 1. What you may do to a computers MAC address if it is on a blacklist
  2. 2. Also known as Pretexting
  3. 4. Turning normal text into data that cant be read
  4. 5. Code which allows hackers to see a computers activities
  5. 8. Is used for a shared network /computer to ensure a person is who they claim to be
  6. 10. A type of penetration testing that is a simulation of a black hat hacker attacking the system from outside the organisation
  7. 12. Automatic way of telling if a machine or human is trying to access the system
  8. 13. Code that is written with the intent to do harm
  9. 15. Persuading an individual to share private information, usually via email or fake website
  10. 17. Something you should do regularly to make your password harder to guess and data more protected