|
"Network security and threats ": HTML5 Crossword |
Across4. Software code that is written to cause harm to data or IT systems (5,0)
7. A person who gains unauthorised entry into a computer system either for a challenge or to cause harm (6,0)
8. A hacker may go through a list of different passwords until access to an account is gained (5,5,6)
9. Rules set in place to make it difficult to break into a network (7,6,0)
10. The capture, recording and analysis of network events in order to discover the source of security attacks or other problem incidents (7,9)
11. States how the network may be used - what is acceptable and unacceptable (10,3,6,0)
14. Performed by simulating an attack on the software to see if there are any weaknesses that can be exploited (11,7,0)
16. Where someone tries to pose as you in order to do something illegal (8,5)
17. Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters (7,0)
18. This security method tries to reduce credit card fraud by getting the user to enter a secret 4 number code (4,3,3,0)
19. Protect a network or system from unauthorised access (8)
|
|
Down1. A piece of malware that can track every key that you press while using your keyboard and send the data remotely to another person (9)
2. Attacking a database by inserting extra commands (3,9)
3. Second part of the log on security (8,0)
5. Where someone tries to mislead or con someone in order to gain an advantage- often to con them out their money (5,0)
6. Overloading web servers with bogus requests (6,2,7,6)
12. Specialists employed by companies to hack their own networks and find security faults or weaknesses (5,3,7)
13. A method of changing original numbers and characters so that they are hidden or disguised (10)
14. The act of illegally copying music, software or films for personal or financial gain (6)
15. A fake website set up which looks like a legitimate company but can trick people into giving their account details and security codes (8)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
4. Software code that is written to cause harm to data or IT systems (5,0)
7. A person who gains unauthorised entry into a computer system either for a challenge or to cause harm (6,0)
8. A hacker may go through a list of different passwords until access to an account is gained (5,5,6)
9. Rules set in place to make it difficult to break into a network (7,6,0)
10. The capture, recording and analysis of network events in order to discover the source of security attacks or other problem incidents (7,9)
11. States how the network may be used - what is acceptable and unacceptable (10,3,6,0)
14. Performed by simulating an attack on the software to see if there are any weaknesses that can be exploited (11,7,0)
16. Where someone tries to pose as you in order to do something illegal (8,5)
17. Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters (7,0)
18. This security method tries to reduce credit card fraud by getting the user to enter a secret 4 number code (4,3,3,0)
19. Protect a network or system from unauthorised access (8)
DOWN
1. A piece of malware that can track every key that you press while using your keyboard and send the data remotely to another person (9)
2. Attacking a database by inserting extra commands (3,9)
3. Second part of the log on security (8,0)
5. Where someone tries to mislead or con someone in order to gain an advantage- often to con them out their money (5,0)
6. Overloading web servers with bogus requests (6,2,7,6)
12. Specialists employed by companies to hack their own networks and find security faults or weaknesses (5,3,7)
13. A method of changing original numbers and characters so that they are hidden or disguised (10)
14. The act of illegally copying music, software or films for personal or financial gain (6)
15. A fake website set up which looks like a legitimate company but can trick people into giving their account details and security codes (8)

|