Cyber Security Puzzle

12345678910111213141516171819
Across
  1. 3. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. 7. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  3. 8. Refers to a company security policy that allows for employees’ personal devices to be used in business.
  4. 9. A defensive technology designed to keep the bad guys out.
  5. 12. Evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
  6. 14. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  7. 15. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  8. 16. An acronym that stands for distributed denial of service – a form of cyber attack.
  9. 18. An internet version of a home address for your computer, which is identified when it communicates over a network.
  10. 19. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.
Down
  1. 1. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage
  2. 2. An umbrella term that describes all forms of malicious software designed to wreak havoc on a computer.
  3. 4. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  4. 5. A set of programs that tell a computer to perform a task.
  5. 6. A technique used by hackers to obtain sensitive information.
  6. 10. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  7. 11. A technology that allows us to access our files and/or services through the internet from anywhere in the world
  8. 13. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  9. 16. A group of computers, printers and devices that are interconnected and governed as a whole.
  10. 17. A piece of malware that can replicate itself in order to spread the infection to other connected computers.