1. 2. Full name of a DoS attack (three words).
  2. 3. A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
  3. 5. The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
  4. 8. A collection of malware infested computers that form a network to attack (e.g. a DDoS attack).
  5. 10. (See xx) A set of cybersecurity threats that rely on a victim falling for a trap set for them (two words).
  6. 11. An important process that verifies a user is really who they are; many different ways this can be done.
  7. 12. An email that contains a message with a suspicious link designed to steal personal information.
  8. 16. An annoying malware that spams you with ads.
  9. 19. A name ... attack is a type of silly survey or quiz that actually harvests personal information from unaware users.
  10. 20. Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
  11. 23. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
  12. 24. I am not a robot.
  13. 26. Settings on folders or files that control who is allowed to access them.
  14. 28. A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly (first word only).
  15. 29. In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
  16. 30. A type of malware that records every single press of the keyboard that you make.
  1. 1. When raw data is put into context and has meaning, the data transforms into ...
  2. 4. Hacking to try and champion a cause, e.g. climate change, rather than to steal information.
  3. 6. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
  4. 7. See clue xx.
  5. 9. An example would be an email from a Nigerian prince asking you to send your name, address, contact number and bank details to him reportedly so you can receive many millions of dollars.
  6. 10. Stealing information from someone simply by looking from behind them.
  7. 12. A ... is created about a user based on data - for example, personal data, shopping habits, etc. - in order to better target that user.
  8. 13. Malicious code intended to monitor your activity without your permission.
  9. 14. Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
  10. 15. Gaining unauthorised access to or control of a computer system.
  11. 17. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
  12. 18. ... authentication requires an additional method of checking that it is really you trying to interface with another system (two words).
  13. 21. A malicious code typically disguised as a legitimate program.
  14. 22. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known.
  15. 25. Protection for a network by monitoring and controlling traffic that passes through it.
  16. 27. The general term for programs that gains access to your system for unethical reasons, e.g. to steal data, cause system damage, send you spam, etc.