Across
- 1. Software used to monitor network or system activities for malicious policy violations.
- 5. A sophisticated, long-term campaign by an attacker to remain undetected while stealing data.
- 9. UK Act that criminalizes unauthorized access to computer material (1990). | **COMPUTER MISUSE ACT
- 11. An attacker who hacks for ideological, political, or social causes rather than financial gain.
- 12. Malware that requires a host file or human action to spread and replicate.,
- 14. A network security device that monitors and filters incoming/outgoing traffic based on rules.
- 15. The chronological documentation of evidence handling.
- 18. The pillar of the CIA triad that ensures data has not been altered or tampered with.
- 19. An attack (XSS) where malicious scripts are injected into trusted websites for users to execute.
- 21. A "decoy" system designed to lure and study attackers.
Down
- 2. An unskilled individual who uses existing automated tools or code to launch cyber attacks.
- 3. An attack that inserts malicious code into a database query to steal or delete data.
- 4. The phase where forensic tools are used to find hidden or deleted files.
- 6. ENGINEERING The practice of manipulating people into divulging confidential info.
- 7. A mathematical algorithm used to verify the integrity of an image.
- 8. An ethical security professional who hacks systems to find and fix vulnerabilities.
- 10. A hacker who falls between ethical and malicious; they may break laws but often without bad intent.
- 13. The practice of partitioning a network into smaller, isolated zones to contain breaches.
- 16. DAY A vulnerability that is unknown to the vendor and has no patch.
- 17. IN DEPTH A defence strategy using multiple layers of security.
- 20. Self-replicating malware that spreads across networks without needing a host file.
