Across
- 4. Changing your Ip or Mac address to appear from a different machine
- 5. (2wds) A misleading compyer program that allows a heacker into your system
- 7. Malware which changes, corrupts, or destroys information, and is then passed on to other systems
- 11. computers and peripherals connected as on entity
- 12. servers that are accessed over the Internet, and the software and databases that run on those servers
- 16. (2wds) Any hacker who attempts to gain unauthorized access to a system with the intent to cause mischief, damage, or theft.
- 19. Process of Identifying a user's identity
- 21. Coding used to protect your infroomation from hackers
- 23. Malware that snoops on you
- 24. Software or Hardware used to keep intruders out
- 25. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
Down
- 1. An approach to security evaluation where manual exploitations and automated techniques are used by attack and security professionals.
- 2. (2wds) techniques aimed at talking target into revealing information or performing an action for illegitimate reasons
- 3. someone is tricked into clicking on one object on a web page when they want to click on another
- 6. a gorup of instructions or applications that instruct a computer to carry out a task
- 8. a wide variety of bad software used to infect and/or damage a system
- 9. (2wds) A hacker who is invited to test out computer systems and servers, looking for vulnerabilities
- 10. a collection of programs or software tools that allow hackers to remotely access and control a computer
- 13. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- 14. (2Wds) Source of leaked information
- 15. Sending fake emails to get you to click on a link
- 16. network of infected computers working together to create security breaches
- 17. A means of attack on a computer system
- 18. malware that encrypts your files until you pay a fee
- 20. Two or more computers connected together to share resources
- 22. (2Wds) Any attempt to breach a electronic systems security boundary