|
"Network security and threats ": HTML5 Crossword |
Across2. Software code that is written to cause harm to data or IT systems (5,0)
5. Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters (7,0)
7. A fake website set up which looks like a legitimate company but can trick people into giving their account details and security codes (8)
8. Overloading web servers with bogus requests (6,2,7,6)
10. Performed by simulating an attack on the software to see if there are any weaknesses that can be exploited (11,7,0)
12. The act of illegally copying music, software or films for personal or financial gain (6)
14. A hacker may go through a list of different passwords until access to an account is gained (5,5,6)
17. Protect a network or system from unauthorised access (8)
19. Rules set in place to make it difficult to break into a network (7,6,0)
20. Second part of the log on security (8,0)
|
|
Down1. This security method tries to reduce credit card fraud by getting the user to enter a secret 4 number code (4,3,3,0)
3. Attacking a database by inserting extra commands (3,9)
4. The capture, recording and analysis of network events in order to discover the source of security attacks or other problem incidents (7,9)
6. Specialists employed by companies to hack their own networks and find security faults or weaknesses (5,3,7)
9. States how the network may be used - what is acceptable and unacceptable (10,3,6,0)
11. Where someone tries to pose as you in order to do something illegal (8,5)
13. Where someone tries to mislead or con someone in order to gain an advantage- often to con them out their money (5,0)
15. A person who gains unauthorised entry into a computer system either for a challenge or to cause harm (6,0)
16. A piece of malware that can track every key that you press while using your keyboard and send the data remotely to another person (9)
18. A method of changing original numbers and characters so that they are hidden or disguised (10)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
2. Software code that is written to cause harm to data or IT systems (5,0)
5. Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters (7,0)
7. A fake website set up which looks like a legitimate company but can trick people into giving their account details and security codes (8)
8. Overloading web servers with bogus requests (6,2,7,6)
10. Performed by simulating an attack on the software to see if there are any weaknesses that can be exploited (11,7,0)
12. The act of illegally copying music, software or films for personal or financial gain (6)
14. A hacker may go through a list of different passwords until access to an account is gained (5,5,6)
17. Protect a network or system from unauthorised access (8)
19. Rules set in place to make it difficult to break into a network (7,6,0)
20. Second part of the log on security (8,0)
DOWN
1. This security method tries to reduce credit card fraud by getting the user to enter a secret 4 number code (4,3,3,0)
3. Attacking a database by inserting extra commands (3,9)
4. The capture, recording and analysis of network events in order to discover the source of security attacks or other problem incidents (7,9)
6. Specialists employed by companies to hack their own networks and find security faults or weaknesses (5,3,7)
9. States how the network may be used - what is acceptable and unacceptable (10,3,6,0)
11. Where someone tries to pose as you in order to do something illegal (8,5)
13. Where someone tries to mislead or con someone in order to gain an advantage- often to con them out their money (5,0)
15. A person who gains unauthorised entry into a computer system either for a challenge or to cause harm (6,0)
16. A piece of malware that can track every key that you press while using your keyboard and send the data remotely to another person (9)
18. A method of changing original numbers and characters so that they are hidden or disguised (10)

|