U03 - CSE-CH03

12345678910111213
Across
  1. 2. A type of malware, similar to a virus, which self-replicates across networks without the need for a user to open an infected program.
  2. 4. (8,8) Protecting the places where people work, and the locations of systems, services and networks.
  3. 8. A weakness, or flaw, in software, a system or process. An attacker exploits these to (for example) gain unauthorised access to a computer system.
  4. 9. (5,9) Files containing data unique to particular pieces of malware, including viruses, that security software downloads in order to aid detection.
  5. 12. A cyber attack where a user is misdirected to a fraudulent website, despite entering the correct address.
  6. 13. (6,5) A type of malware, disguised as legitimate software, that is used to gain unauthorised access to a victim's computer.
Down
  1. 1. (5,8) A form of phishing targeting particular individuals, where the email is designed to look like it's from a trusted or known person.
  2. 3. is any kind of software that can damage computer systems, networks or devices. Includes viruses, ransomware and trojans.
  3. 5. (6,11) A technique an attacker uses to manipulate people into carrying out specific actions, or divulging information.
  4. 6. Deliberate or accidental threat to an organisation's security from someone who has authorised access (such as an employee).
  5. 7. Highly targeted phishing attacks (that look like legitimate emails) aimed at senior executives.
  6. 10. (4,3) Recently discovered vulnerability that hackers can exploit, where a fix or patch isn't publicly available yet.
  7. 11. Unsolicited email sent in bulk, also referred to as junk email.