PREMIUM LOGIN

ClassTools Premium membership gives access to all templates, no advertisements, personal branding and many other benefits!
 

Username:    
Password:    
Submit Cancel

 

Not a member?

JOIN NOW!

 
                             
                                               
                 
                                               
                   
                                               
                                               
                               
                                             
               
                                           
                               
                                         
                                         
           
                                         
                               
                         
                                   
                                       
                                       
                                         
                     
                                           
                                     
                                             
                               
                                             
                             
                                               

"Network security and threats ": HTML5 Crossword

Across

1. This security method tries to reduce credit card fraud by getting the user to enter a secret 4 number code (4,3,3,0)
3. The capture, recording and analysis of network events in order to discover the source of security attacks or other problem incidents (7,9)
4. Specialists employed by companies to hack their own networks and find security faults or weaknesses (5,3,7)
5. A fake website set up which looks like a legitimate company but can trick people into giving their account details and security codes (8)
7. A hacker may go through a list of different passwords until access to an account is gained (5,5,6)
9. The act of illegally copying music, software or films for personal or financial gain (6)
11. States how the network may be used - what is acceptable and unacceptable (10,3,6,0)
13. Where someone tries to mislead or con someone in order to gain an advantage- often to con them out their money (5,0)
14. Second part of the log on security (8,0)
17. Rules set in place to make it difficult to break into a network (7,6,0)
18. Software code that is written to cause harm to data or IT systems (5,0)
19. Protect a network or system from unauthorised access (8)
20. A piece of malware that can track every key that you press while using your keyboard and send the data remotely to another person (9)

Down

2. Overloading web servers with bogus requests (6,2,7,6)
6. Attacking a database by inserting extra commands (3,9)
8. A method of changing original numbers and characters so that they are hidden or disguised (10)
10. Performed by simulating an attack on the software to see if there are any weaknesses that can be exploited (11,7,0)
12. A person who gains unauthorised entry into a computer system either for a challenge or to cause harm (6,0)
15. Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters (7,0)
16. Where someone tries to pose as you in order to do something illegal (8,5)

new edit share pdf:puzzle pdf:answers Create an editable copy