Across
- 3. a form of extortion malware which steals data accompanied by the threat to publish such data unless a ransom is paid; sometimes referred to as doxware
- 5. occurs when data is viewed or stolen by an unauthorised third party; sometimes referred to as data ‘compromise’, as distinct from an ‘incident’ where data disclosure is possible, but unconfirmed
- 7. the use of the internet to control or disrupt remote physical objects or infrastructure
- 8. internet-of-things, a rapidly growing network of physical devices, including but not limited to traditional computing devices, that are connected to the internet allowing for remote data transfer and operation
- 9. contraction of ‘malicious software’; software designed to harm or damage a computer system or the interests of the user; includes viruses, worms, Trojans, spyware, ransomware, cryptomining software
- 10. an overlay of the open internet using software and/or permissions to limit public access, it operates on a peer- to-peer or encrypted basis, where only trusted parties have access to content and communications; for this reason, it is preferred by criminal organisations and marketplaces where stolen and illicit content and data can be traded, though it has other uses including political discourse and whistleblowing
- 11. an attack which takes advantage of a vulnerability or defect in a computer system giving unauthorised access or control to a third party
Down
- 1. distributed denial of service attack, whereby many compromised computers simultaneous send data requests to a target machine for the purpose of overwhelming the system resources, thereby making the core functions unavailable to legitimate users
- 2. spread generally by unsolicited email, attempts to trick a person into revealing identity credentials, login details or passwords for the purpose of fraud
- 4. an unauthorised and unknown access point into a computer system through which a remote attacker can gain access or steal information
- 6. separating sensitive or valuable systems or information sources from other parts of a network to reduce the chances of data loss or compromise
