Across
- 3. information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc.
- 5. A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system
- 7. A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
- 9. A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
- 11. is a type of software program created to protect information technology (IT) systems and individual computers from malicious software, or malware
- 12. A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.
- 13. is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- 14. facts provided or learned about something or someone.
- 16. Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- 17. is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.
- 20. A computer virus is a type of malware that attaches itself to other programs, self-replicates, and spreads from one computer to another.
- 22. something has been done which was: not intended by the actor; not desired by a set of rules or an external observer; or that led the task or system outside its acceptable limits.
- 23. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.
- 24. Hacking or Black Hat hacking is performed by cybercriminals with the false intention of stealing sensitive data, money, and access the restricted networks and systems.
Down
- 1. A blagging attack is a version of a phishing attack, again with its background in social engineering.
- 2. the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- 4. Automatic software updates are the process in which your software applies critical updates without seeking confirmation from a user
- 6. As software designed to interfere with a computer's normal functioning, malware is a blanket term for viruses, trojans, and other destructive computer programs threat actors use to infect systems and networks in order to gain access to sensitive information.
- 8. Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- 10. A name generator attack is an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
- 15. In a Distributed Denial of Service attack, the attacker enlists the help of (many) thousands of Internet users to each generate a small number of requests which, added together, overload the target.
- 18. Statistics that can be used to analise or observe.
- 19. The authorization given to users that enables them to access specific resources on the network, such as data files, applications, printers and scanners.
- 21. A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.