Across
- 3. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.
- 4. A defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based.
- 6. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- 9. A security measure designed to verify an individual`s authorization to access computer or security information.
- 11. A piece of malware that can replicate itself in order to spread the infection to other connected computers.
- 12. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
Down
- 1. An environment in which digitized information is distributed on networks of computers.
- 2. The largest WAN in the world.
- 5. A technique used by hackers to obtain sensitive information. For example, using hand-crafted email messages designed to trick people into divulging personal or confidential data such as passwords and bank account information.
- 7. Shift cipher named after a famous Roman, Julius ?
- 8. Machine used in WW2 to send secret messages in Germany.
- 10. Statement of intention to inflict damage or hostile action.
