Across
- 5. a technique of hiding information within other, seemingly innocuous files, such as images, audio, or video files.
- 6. is a general term for any type of intrusive computer software with malicious intent against the user.
- 9. decoding cipher text to plain text
- 10. a type of internet fraud that seeks to acquire a user’s credentials by deception
- 12. attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
- 13. additional, revised or updated code for an operating system or application.
Down
- 1. encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals (2 words)
- 2. a type of cyberattack where an attacker secretly uses someone else’s device to mine cryptocurrency without their permission.
- 3. the process of verifying the identity of a user or piece of information and the veracity of the information provided.
- 4. a cyberattack that redirects users from a legitimate website to a fraudulent one without their knowledge, even if they type in the correct web address. This is typically done by corrupting the website’s DNS (Domain Name System) settings.
- 7. a hacker successfully breaching a network or device to gain access to it's files and data ( 2 words )
- 8. a cybersecurity threat that involves registering domain names similar to legitimate ones, often with minor typos , Attackers use these lookalike domains to trick users into visiting fake websites
- 11. extends a private network across a public network,a virtual secure network
- 12. unsolicited emails,the email equivalent of physical junk mail delivered through the post.