InfoSecurity Fest - Crossword Puzzle

1234567891011121314
Across
  1. 4. Collective name that describes all forms of malicious software designed to wreak havoc on a computer.
  2. 6. A hardware or software-based defensive technology designed to protect your network by blocking outsiders from gaining unauthorized access.
  3. 7. Type of malicious program aimed to corrupt, erase or modify information on a computer before spreading to others.
  4. 10. A form of malware that deliberately holds your data hostage and demands a fee to be paid to regain access to the files on your computer.
  5. 13. An audio or video clip that has been edited and manipulated to seem real or believable.
  6. 14. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
Down
  1. 1. A type of unwanted malicious software that functions by spying on user activity without their knowledge and captures sensitive information.
  2. 2. Group of computers, printers and devices that are interconnected and governed as a whole.
  3. 3. Technology that allows us to access our files and/or services through the internet from anywhere in the world.
  4. 5. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  5. 8. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  6. 9. A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer.
  7. 11. A piece of malware that can replicate itself in order to spread the infection to other connected computers.
  8. 12. The technique used by hackers to obtain sensitive information using hand-crafted email messages designed to trick people.