Across
- 3. A security system that monitors and controls incoming and outgoing data , can inspect to see if suspicious
- 6. A cyber attack intended to redirect a website's traffic to another, fake site.
- 7. A reason why a password may be easy to guess and weak
- 8. Code which downloads and displays adverts
- 9. Measurements and calculations for human characteristics and the body
- 11. If a mac address is on this, it will be able to access the system
- 14. A type of hacker who gains access to data without permission and with the intent to harm the data
- 16. Physical viewing an others sensitive information,by looking at people entering personal information onto a computer or a cash machine
- 18. Code that is capable of copying itself to damage or destroy data
- 19. A program that appears safe but is malicious and is designed to harm data. Installed by the user
Down
- 1. What you may do to a computers MAC address if it is on a blacklist
- 2. Also known as Pretexting
- 4. Turning normal text into data that cant be read
- 5. Code which allows hackers to see a computers activities
- 8. Is used for a shared network /computer to ensure a person is who they claim to be
- 10. A type of penetration testing that is a simulation of a black hat hacker attacking the system from outside the organisation
- 12. Automatic way of telling if a machine or human is trying to access the system
- 13. Code that is written with the intent to do harm
- 15. Persuading an individual to share private information, usually via email or fake website
- 17. Something you should do regularly to make your password harder to guess and data more protected
