Across
- 4. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
- 6. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
- 8. a cyber attack intended to redirect a website's traffic to another, fake site.
- 11. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
- 12. A hijacking technique in which a cracker pretends as a trusted host to disguise someone’s identity, hijack browsers, or gain access to a network.
- 15. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
- 16. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
- 17. A bundle of programs that is designed to bombard users with advertisements.
Down
- 1. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
- 2. A bunch of several Internet-connected devices such as PCs, mobiles, servers and IoT devices that is infectious and controlled by a specific type of malware.
- 3. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- 5. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.
- 7. Intrusion Detection System Software or device that functions to monitor network traffic for malicious activity.
- 9. The process by which two information systems establish a communication channel.
- 10. A computer program that keeps a log of your keystrokes on your keyboard.
- 13. Protocol that is meant for uploading and downloading files.
- 14. A bridge between two networks that connects using different protocols.
- 18. A firewall setting that separates LAN of an organization from the external network.
