Cybersecurity

123456789101112131415161718
Across
  1. 2. is used to describe everyday objects that are connected to the internet and are able to collect and transfer data automatically,
  2. 6. is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
  3. 8. bombards users with endless ads and pop-up windows and causes a nuisance to the user experience
  4. 9. attack that is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found
  5. 10. is a general term for any type of intrusive computer software with malicious intent against the user.
  6. 12. is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm
  7. 13. are computer security programs that simulate network resources that hackers are likely to look for to lure them in and trap them.
  8. 15. is the delivery of hosted services, including software, hardware, and storage, over the Internet.
  9. 16. every aspect of protecting an organization and its employees and assets against cyber threats.
  10. 17. is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  11. 18. integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
Down
  1. 1. is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal
  2. 3. is the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit.
  3. 4. is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
  4. 5. is the process of decoding cipher text to plain text so that it is readable by humans
  5. 7. is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
  6. 11. is a kind of spyware software that records every keystroke made on a computer’s keyboard.
  7. 14. refers to the technologies, policies, controls, and services that protect cloud data, applications, and infrastructure from threats.