Cybersecurity

123456789101112131415161718192021222324
Across
  1. 3. information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc.
  2. 5. A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system
  3. 7. A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
  4. 9. A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
  5. 11. is a type of software program created to protect information technology (IT) systems and individual computers from malicious software, or malware
  6. 12. A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.
  7. 13. is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  8. 14. facts provided or learned about something or someone.
  9. 16. Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
  10. 17. is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.
  11. 20. A computer virus is a type of malware that attaches itself to other programs, self-replicates, and spreads from one computer to another.
  12. 22. something has been done which was: not intended by the actor; not desired by a set of rules or an external observer; or that led the task or system outside its acceptable limits.
  13. 23. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.
  14. 24. Hacking or Black Hat hacking is performed by cybercriminals with the false intention of stealing sensitive data, money, and access the restricted networks and systems.
Down
  1. 1. A blagging attack is a version of a phishing attack, again with its background in social engineering.
  2. 2. the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  3. 4. Automatic software updates are the process in which your software applies critical updates without seeking confirmation from a user
  4. 6. As software designed to interfere with a computer's normal functioning, malware is a blanket term for viruses, trojans, and other destructive computer programs threat actors use to infect systems and networks in order to gain access to sensitive information.
  5. 8. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  6. 10. A name generator attack is an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
  7. 15. In a Distributed Denial of Service attack, the attacker enlists the help of (many) thousands of Internet users to each generate a small number of requests which, added together, overload the target.
  8. 18. Statistics that can be used to analise or observe.
  9. 19. The authorization given to users that enables them to access specific resources on the network, such as data files, applications, printers and scanners.
  10. 21. A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.