Across
- 2. is used to describe everyday objects that are connected to the internet and are able to collect and transfer data automatically,
- 6. is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
- 8. bombards users with endless ads and pop-up windows and causes a nuisance to the user experience
- 9. attack that is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found
- 10. is a general term for any type of intrusive computer software with malicious intent against the user.
- 12. is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm
- 13. are computer security programs that simulate network resources that hackers are likely to look for to lure them in and trap them.
- 15. is the delivery of hosted services, including software, hardware, and storage, over the Internet.
- 16. every aspect of protecting an organization and its employees and assets against cyber threats.
- 17. is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- 18. integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
Down
- 1. is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal
- 3. is the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit.
- 4. is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
- 5. is the process of decoding cipher text to plain text so that it is readable by humans
- 7. is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
- 11. is a kind of spyware software that records every keystroke made on a computer’s keyboard.
- 14. refers to the technologies, policies, controls, and services that protect cloud data, applications, and infrastructure from threats.