Across
- 2. a form of computer storage that can be rewritten multiple times.
- 5. when cybercriminals use deception to appear as another person or source of information.
- 9. using a person’s unique characteristics to verify their identity, including fingerprint scanning, facial recognition and voice recognition.
- 14. a piece of computer hardware that renders graphics on a device.
- 15. the method of gaining the trust of a user so that the attacker can acquire sensitive information that can be used to access data.
- 16. a string of numbers used to identify devices on the internet or network.
- 18. a short-range and contactless form of communication that allows devices to communicate with each other.
Down
- 1. an attack that aims to disrupt normal web traffic from accessing a site by flooding a server with internet traffic.
- 3. a sequence of instructions used to perform a task in software.
- 4. a system of devices that are infected with malware and is controlled by an attacker, sometimes used in DDoS attacks.
- 6. an attack that uses email, phone or text to get someone to provide sensitive information such as passwords and credit card information.
- 7. the process of identifying problems through a rigorous and repeatable process and then solving those problems using testable methods.
- 8. a set of actions aimed to infiltrate computer networks, systems and personal devices.
- 10. digital storage used to store temporary files that devices can use for future requests in order to run more efficiently.
- 11. a type of cloud computing that provides access to storage, servers, memory, etc.
- 12. a large network of information and data that is not tied to a single location.
- 13. an extension of a private network over public resources, using dedicated hardware or software to create the extension and securely transmit data.
- 17. an open-source operating system used extensively in IT infrastructure.