Ethical Hacking

123456789101112
Across
  1. 1. is the practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
  2. 8. refers to any access or action that is not permitted or approved, usually involving someone trying to enter systems or data without permission.
  3. 9. means having the intention to cause harm. In tech, it describes software or behavior designed to damage or disrupt systems or steal data.
  4. 10. are individuals who gain access to systems or networks, often bypassing security measures. They can be malicious (black-hat), ethical (white-hat), or somewhere in between (gray-hat).
  5. 11. is a type of malware that locks or encrypts a victim’s data and demands payment (a ransom) to restore access.
  6. 12. is any potential danger or risk that could exploit a vulnerability to harm a system, network, or organization.
Down
  1. 2. is someone who commits crimes through the internet or using computers, often for financial gain, data theft, or sabotage.
  2. 3. are a type of malware that attach themselves to legitimate programs or files and spread when those files are opened, often damaging systems or data.
  3. 4. refers to criminal activities carried out using computers or the internet, such as hacking, identity theft, or spreading malware.
  4. 5. refers to information that is stored and processed by computers. It can include text, images, videos, or any other type of digital content.
  5. 6. (short for malicious software) is any software designed to harm, exploit, or otherwise compromise a computer, system, or network.
  6. 7. is an incident where unauthorized individuals gain access to data, systems, or networks, often resulting in data loss, theft, or compromise.