Across
- 4. a _____ attack is where a hacker attempts to steal user information, usually in the format of a fake login screen.
- 5. malware that spies on the user discreetly
- 7. an electronic attack on a computer system
- 9. updates are sometimes referred to as ______
- 10. often, the weakest link in a computer system is the ______
- 12. A backup that only backs up what changed is called an ________ backup
- 14. companies will often a strict backup ______
- 15. the preferred currency of hackers as it is decentralized
- 17. software that attempts to remove potential malware from your computer
- 19. is what anti-malware does to identify malware by its behaviour
- 20. a type of software that logs all keys to a file
- 21. ____ pro quo is latin for "this for that" and in CS is where the victim is offered a benefit for using the software
Down
- 1. ________ encryption is where something is encrypted and decrypted with the same key
- 2. _______ software is software that is not up to date and could be vulnerable to attacks
- 3. The type of malware that holds the user's files ransom (encrypted) until they pay
- 6. any type of software that is designed to harm the computer it is installed on.
- 8. a malicious piece of software that will self replicate
- 11. anti malware software recognises malware based on the definitions or _______
- 13. a malicious piece of software that acts as another piece of software to get the user to install it.
- 16. encrypted plain text is referred to as ____ text
- 18. social ________ is where the hacker will convince someone to give them access to the computer system
