Across
- 2. company security policy that allows for employees’ personal devices to be used in business.
- 3. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others
- 5. malware that functions by spying on user activity without their knowledge.
- 8. technology that allows access to files/services through the internet from anywhere in the world.
- 9. acronym that stands for distributed denial of service – a form of cyber attack.
- 12. malicious application or script that can be used to take advantage of a computer’s vulnerability.
- 13. A piece of malware that often allows a hacker to gain remote access to a computer through a back door
- 14. software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
- 15. udio or video clip that has been edited and manipulated to seem real or believable
- 17. internet version of a home address for your computer
- 19. hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- 20. defensive technology designed to keep the bad guys out
- 22. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and networ
- 23. umbrella term that describes all forms of malicious software
- 24. tool that allows the user to remain anonymous while using the internet
- 25. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
- 1. malware that allows cybercriminals to remotely control your computer.
- 4. technique used to manipulate and deceive people to gain sensitive and private information
- 6. form of malware that deliberately prevents you from accessing files on your computer – holding your data hostag
- 7. group of computers, printers and devices that are interconnected and governed as a whole
- 10. set of programs that tell a computer to perform a task
- 11. Breaches the network to gain sensitive information with the owner’s consent
- 16. this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- 18. technique used by hackers to obtain sensitive information.
- 21. piece of malware that can replicate itself in order to spread the infection to other connected computers