Information Security

12345678910111213141516171819202122232425262728
Across
  1. 1. A type of malware that records every single press of the keyboard that you make
  2. 3. A key only used by one individual to decrypt
  3. 4. A key that can be used by anyone to encrypt messages
  4. 6. Gaining unauthorised access to or control of a computer system
  5. 9. A trap for cybersecurity criminals
  6. 10. Bullying that takes place online
  7. 13. A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
  8. 16. Special viruses that move from computer to computer without human action
  9. 17. Impersonation of email address or device to gain unauthorized access to information or systems
  10. 18. Copy of data
  11. 19. Hacking to try and champion a cause, e.g. climate change, rather than to steal information
  12. 24. A weaknesses in computers
  13. 26. scrambled data
  14. 27. Ethical hacking in order to find any cybersecurity weaknesses
  15. 28. Raw data that is put into context and has meaning
Down
  1. 1. core of an operating system
  2. 2. General term for programs that gains access to your system for unethical reasons
  3. 4. Email that contains a message with a suspicious link designed to steal personal information
  4. 5. annoying malware that spams you with ads
  5. 7. Software that protects computers from virus related harm
  6. 8. Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
  7. 11. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
  8. 12. Malicious code typically disguised as a legitimate program
  9. 14. To take advantage of a system's weakness
  10. 15. I am not a robot
  11. 18. Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
  12. 20. Secretly watches computer activity
  13. 21. Collection of malware infested computers that form a network to attack
  14. 22. Electronic messages sent through the internet
  15. 23. Readable data
  16. 24. Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  17. 25. An internal security team that defends against both real attackers and Red Teams