Across
- 4. a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
- 5. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- 7. the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
- 8. an isolated environment on a network that mimics end-user operating environments.
- 9. Comprised of any number and variety of interconnected devices
Down
- 1. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- 2. encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
- 3. Breach of a system's security policy in order to affect its integrity or availability
- 5. any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
- 6. string of characters used to verify the identity of an user during the authentication process