Jasper's CJR Cyber Security Terms

12345678910111213141516171819202122
Across
  1. 3. ___ bombards users with endless ads and pop-up windows and causes a nuisance to the user experience.
  2. 4. ___ is the name commonly given to unsolicited emails.
  3. 7. ____ is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm.
  4. 8. ____ is a general term for any type of intrusive computer software with malicious intent against the user.
  5. 9. ___ ___ is the deliberate theft of sensitive data by nefarious actors.
  6. 10. Bring Your Own Device (abbreviation)
  7. 13. A ___ is a malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device.
  8. 14. ____ is malware that uses scare tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus
  9. 16. _____ relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked.
  10. 17. Breach A __ ___ is the event of a hacker successfully exploits a network or device vulnerability and gains access to its files and data.
  11. 19. _____ is the name given to malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data.
  12. 20. A ___ is a program that automates actions on behalf of an agent for some other program or person and is used to carry out routine tasks.
  13. 21. A ____ is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
  14. 22. ____ is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
Down
  1. 1. _____ is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  2. 2. A ____ is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal.
  3. 4. ____ is software that is secretly installed on a user’s device to gather sensitive data.
  4. 5. _____ is the process of verifying the identity of a user or piece of information and the veracity of the information provided.
  5. 6. Force Attack This is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found.
  6. 9. The __ __ is encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  7. 11. _____ is the process of decoding cipher text to plain text so that it is readable by humans. It is the reverse of encryption
  8. 12. A ___ is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
  9. 15. ___ solutions integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
  10. 18. ____ ____ are features which may be included in digital television services, computer and video games, mobile devices, and software that allow parents to restrict the access of content to their children.