|
"network and software security ": HTML5 Crossword |
Across5. A type of malware installed without the users knowledge in order to collect the users private information (7)
6. An infected computer that is remotely controlled by a hacker (6)
8. Useful for maintaining security and for recovering lost data (11)
12. The unwanted transmission of unwanted messages in bulk (4)
14. An email that tricks you into handing over sensitive or personal information (13)
15. Somewhere in between black and white hats (14)
16. A Website or email that tricks you into entering your username and password so that it can be recorded and used by the fraudster (8)
17. When testers are given no more information than any potential hacker may have (15)
18. The name of a person who exploits weaknesses in a network for an employer (14)
19. The fraudulent use of someone else's name and personal information to obtain credit loans (13)
|
|
Down1. The general term used to describe software that is designed to disrupt or damage a computer software (7)
2. Theft, vandalism, natural disasters, flood, fire, earthquake (13,0)
3. A person who gains unauthorised access to a computer system by breaking codes and passwords (6)
4. An application that appears to be something useful but in fact it actually causes damage once installed (6)
7. A class of malware designed specifically to automate cybercrime usually for the purpose for making fraudulent transactions (9)
9. Programs that keep track of which advertisements you click on and then send specific advertisements to your browser (6)
10. The umbrella term for software that harms a computer (7)
11. The main cause of data loss in an organisation (9)
13. testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system (15)
18. A type of virus that spreads on its own and slows down networks (4)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
5. A type of malware installed without the users knowledge in order to collect the users private information (7)
6. An infected computer that is remotely controlled by a hacker (6)
8. Useful for maintaining security and for recovering lost data (11)
12. The unwanted transmission of unwanted messages in bulk (4)
14. An email that tricks you into handing over sensitive or personal information (13)
15. Somewhere in between black and white hats (14)
16. A Website or email that tricks you into entering your username and password so that it can be recorded and used by the fraudster (8)
17. When testers are given no more information than any potential hacker may have (15)
18. The name of a person who exploits weaknesses in a network for an employer (14)
19. The fraudulent use of someone else's name and personal information to obtain credit loans (13)
DOWN
1. The general term used to describe software that is designed to disrupt or damage a computer software (7)
2. Theft, vandalism, natural disasters, flood, fire, earthquake (13,0)
3. A person who gains unauthorised access to a computer system by breaking codes and passwords (6)
4. An application that appears to be something useful but in fact it actually causes damage once installed (6)
7. A class of malware designed specifically to automate cybercrime usually for the purpose for making fraudulent transactions (9)
9. Programs that keep track of which advertisements you click on and then send specific advertisements to your browser (6)
10. The umbrella term for software that harms a computer (7)
11. The main cause of data loss in an organisation (9)
13. testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system (15)
18. A type of virus that spreads on its own and slows down networks (4)

|