Across
- 2. A type of malware, similar to a virus, which self-replicates across networks without the need for a user to open an infected program.
- 4. (8,8) Protecting the places where people work, and the locations of systems, services and networks.
- 8. A weakness, or flaw, in software, a system or process. An attacker exploits these to (for example) gain unauthorised access to a computer system.
- 9. (5,9) Files containing data unique to particular pieces of malware, including viruses, that security software downloads in order to aid detection.
- 12. A cyber attack where a user is misdirected to a fraudulent website, despite entering the correct address.
- 13. (6,5) A type of malware, disguised as legitimate software, that is used to gain unauthorised access to a victim's computer.
Down
- 1. (5,8) A form of phishing targeting particular individuals, where the email is designed to look like it's from a trusted or known person.
- 3. is any kind of software that can damage computer systems, networks or devices. Includes viruses, ransomware and trojans.
- 5. (6,11) A technique an attacker uses to manipulate people into carrying out specific actions, or divulging information.
- 6. Deliberate or accidental threat to an organisation's security from someone who has authorised access (such as an employee).
- 7. Highly targeted phishing attacks (that look like legitimate emails) aimed at senior executives.
- 10. (4,3) Recently discovered vulnerability that hackers can exploit, where a fix or patch isn't publicly available yet.
- 11. Unsolicited email sent in bulk, also referred to as junk email.
