Across
- 3. a method that used to find out a password by monitoring traffic on a network to pull out information.
- 4. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
- 5. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage while asking for payment.
- 6. An attack on targeted individuals to obtain sensitive, personal, and confidential data via email or fraudulent websites.
- 7. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- 8. This allows users to connect the organization's protected network using multi-factor authentication.
- 11. An individual or group posing a threat.
- 12. A computer under the control of a remote attacker which has been infected with software or scripts to perform tasks on command.
Down
- 1. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- 2. A technique used to manipulate and deceive people to gain sensitive and private information. These scams are built around how people think and act.
- 9. The process of changing plaintext into ciphertext using a cryptographic algorithm and key.
- 10. An audio or video clip that has been edited and manipulated to seem real or believable.