Across
- 3. techniques are cons (Schwindel) conducted through technology. The goal is to trick someone into giving up money, information, or valuables through manipulation and false promises.
- 5. Scrambles data, making it essentially unreadable to any program that doesn’t have the descrambling password, known as key. Even if copied or stolen.
- 6. bad guys, also known as “crackers”
- 7. One of the malevolent goals. Software that secretly monitors user actions, network traffic, or scans for files
- 9. networks of infiltrated and compromised machines controlled by a central command
- 10. seeks to compromise a computing system without permission. There are many forms of Malware for instance Viruses, Worms, Trojans
Down
- 1. good guys, probe for weaknesses, but don’t exploit them. They share their knowledge so that holes can be found & plugged hence security improves. They are part of the company auditing & security process
- 2. examines traffic as it enters and leaves the network, potentially blocking certain types of access, while permitting approved communication
- 4. hackers use psychology (exploit trust or curiosity) rather than code to trick employees into revealing information or performing other tasks that compromise a firm.
- 8. effectively shutting down Websites by overwhelming them with a crushing load of seemingly legitimate requests sent simultaneously by thousands of machines.
