Share Focus Mode

cybersecurity

123456789101112131415161718192021222324
Across
  1. 2. A threat to a computer system/network can result in a risk, for example, if a hacker gains access to a person's computer, there is a risk that data will be stolen
  2. 5. A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
  3. 6. An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
  4. 8. The activity of defrauding an online account holder of financial information by posing as a legitimate company
  5. 12. Designed to detect and destroy computer virus
  6. 13. An individual who gains unauthorized access to a computer system/network for social or political purposes.
  7. 14. An individual who attempts to gain, for example, money from another person by fraudulent means enabled by the use of computers and the Internet.
  8. 16. internet Is the global system of interconnected computer networks that use the Internet protocol suite
  9. 17. A network point that acts as an entrance to another network
  10. 20. A feature or defect of a computer system that allows surreptitious unauthorized access to data
  11. 21. A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
  12. 22. A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
  13. 23. Software designed to prevent, detect and eradicate malicious software, such as a virus or a worm
Down
  1. 1. Gaining access into a computer system/network illegally.
  2. 3. an automated program that runs over the Internet
  3. 4. Self-replicating virus that does not alter files but resides in active memory and duplicates itself
  4. 7. Data confidentiality is a measure of the ability of a system to protect its data
  5. 9. A person who uses computers to gain unauthorized access to data
  6. 10. It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
  7. 11. Software that is intended to damage or disable computers and computer systems
  8. 12. Software is designed to prevent, detect and eradicate malicious software, such as a virus or a worm
  9. 15. A network of computers infected with malicious software and controlled without the owners' knowledge, for example, to send spam or hoax emails
  10. 16. A program that claims to rid your computer of viruses but instead introduces viruses onto your computer
  11. 18. management Managing the access to a computer system/network. It includes procedures such as account administration, account maintenance, account monitoring, and the revocation of an account
  12. 19. Usually an email message warning recipients of a non-existent threat, usually forging quotes supposedly from authorities such as Microsoft and IBM.
  13. 24. Something that is of value to a person, an organisation or a state, e.g. data, finance and secrets that should be secured against cyber security incidents.