Across
- 2. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system, to lay hands on the personal info like banking credentials or infect the network as well.
- 5. A bridge between two networks that connects using different protocols.
- 7. A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
- 8. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- 10. A firewall setting that separates LAN of an organization from the external network.
- 12. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
- 13. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- 14. A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
- 15. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Down
- 1. Protocol that is meant for uploading and downloading files.
- 3. A bundle of programs that is designed to bombard users with advertisements.
- 4. A computer program that keeps a log of your keystrokes on your keyboard.
- 6. A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
- 7. A malicious mechanism which redirects a user to a fake site falsely, appearing to be a genuine one with the intent of tricking a user into entering all the credentials into the duplicate site.
- 9. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- 11. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
