Across
- 2. Publishing someone's personal information online without their consent
- 3. Users are tricked into revealing sensitive information to gain access to a system
- 6. A form a social engineering that is done via email or other messages
- 9. Area of study where machines are programmed to reason, learn and act similar to human intelligence
- 10. Software that causes damage to data and software
- 12. A network device used to separate an internal network from an external network, usually the Internet
- 13. Software to disrupt, damage or gain unauthorised access to a computer system
- 15. Any or a combination of usernames, passwords or biometrics to access a system
Down
- 1. Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
- 4. A technique used to disguise the sender's identity to gain sensitive information
- 5. A method of writing that disguises a message
- 7. Type of threat that has the potential to or cause actual damage that can be done to an organisation by a person with authorized access to systems
- 8. Malicious software that prevents access to a system until a ransom is paid
- 11. Sofware that automatically subjects a user to advertisements
- 14. A person who uses computers to gain unauthorized access to data
