Across
- 2. method through which information is converted into secret code through a special algorithm that hides information's true meaning
- 3. program or hardware device that filters information coming through an internet connection to a network or computer system.
- 5. This attack is carried out by repeatedly trying password combinations till the password match is found.
- 8. URLs that lead user to visit an harmful website or to download a virus
- 9. This is a worm which came in mid-2010 and was responsible for huge damage to Iran's Nuclear Program.
- 11. programs that are used to track or record users keystroke
- 13. Centralized Monitoring, analysis, detection/prevention & response to cybersecurity incidents.
- 15. The malicious program malware that downloads onto a computer disguised as a legitimate program. Named after an ancient greek story.
- 16. I am not a robot
- 17. Weaknesses that can be exploited
- 19. Packets of data sent from server to browser used to identify the browser
- 20. Framework that is a set of guidelines for mitigating organizational cybersecurity risks, published by the US National Institute of Standards and Technology
- 21. Malicious software that is installed on the device without the end user's knowledge and is used to monitor activity without the user's permission.
- 23. information about a file
- 25. The process of transforming the data from unreadable format to the original message.
- 27. You are sending one confidential document to your colleague. In transmission, data gets tampered & content was changed. Which part of security was lost here
- 28. Used to commit financial crimes. The attack in which a small amount is taken out every day so that attack goes unnoticed. The name of the attack resembles closely to a chicken dish.
- 29. Special viruses that replicate from computer to computer in a network without human interaction
Down
- 1. Group of malware-infected computers that form a network to attack
- 4. The device or application that monitors a network for malicious activities and has the ability to protect from or stop the incidents from taking place.
- 6. this is a vital information resource under siege
- 7. the system that shows the location of the person or places through satellites.
- 10. The authentication method in which requires two or more verification methods to gain access to the system.
- 12. This is the world's first virus(Boot-Sector Virus)
- 13. This method is used to hide information inside the picture.
- 14. network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access.
- 18. The attack that is done to bring down the system or to hinder the normal function of the website or other network resources.
- 22. process of giving permission to someone of doing something
- 24. science of collecting and analyzing information from information and communication technologies as evidence in a legal case.
- 26. Process of being friends builds trust and emotional connection with a young person with future intentions of sexual abuse, exploitation or traficking.