|
"System and network threts": HTML5 Crossword |
Across1. a Website or email that tricks you into entering your username and password so that it can be recorded and used by the fraudster (8)
3. a class of malware designed specifically to automate cybercrime usually for the purpose for making fraudulent transactions (9)
4. The fraudulent use of someone else's name and personal information to obtain credit loans etc (13)
5. the main cause of data loss in an organisation (9)
6. A type of virus that spreads on its own and slows down networks (4)
8. testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system (15)
9. the general term used to describe software that is designed to disrupt or damage a computer software (7)
11. a type of malware installed without the users knowledge in order to collect the users private information (7)
13. an infected computer that is remotely controlled by a hacker (6)
16. when testers are given no more information than any potential hacker may have (15)
17. A person who gains unauthorised access to a computer system by breaking codes and passwords (6)
18. the unwanted transmission of unwanted messages in bulk (4)
19. programs that keep track of which advertisements you click on and then send specific advertisements to your browser (6)
|
|
Down2. an email that tricks you into handing over sensitive or personal information (13)
7. Similar to police forensics, network administrators can use audit trail data to solve data mysteries (16)
10. theft, vandalism, natural disasters, flood , fire , earthquake (13,0)
12. useful for maintaining security and for recovering lost data (11)
14. an application that appears to be something useful but in fact it actually causes damage once installed (6)
15. Acts as a filter or barrier between your own trusted network and another (8)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
1. a Website or email that tricks you into entering your username and password so that it can be recorded and used by the fraudster (8)
3. a class of malware designed specifically to automate cybercrime usually for the purpose for making fraudulent transactions (9)
4. The fraudulent use of someone else's name and personal information to obtain credit loans etc (13)
5. the main cause of data loss in an organisation (9)
6. A type of virus that spreads on its own and slows down networks (4)
8. testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system (15)
9. the general term used to describe software that is designed to disrupt or damage a computer software (7)
11. a type of malware installed without the users knowledge in order to collect the users private information (7)
13. an infected computer that is remotely controlled by a hacker (6)
16. when testers are given no more information than any potential hacker may have (15)
17. A person who gains unauthorised access to a computer system by breaking codes and passwords (6)
18. the unwanted transmission of unwanted messages in bulk (4)
19. programs that keep track of which advertisements you click on and then send specific advertisements to your browser (6)
DOWN
2. an email that tricks you into handing over sensitive or personal information (13)
7. Similar to police forensics, network administrators can use audit trail data to solve data mysteries (16)
10. theft, vandalism, natural disasters, flood , fire , earthquake (13,0)
12. useful for maintaining security and for recovering lost data (11)
14. an application that appears to be something useful but in fact it actually causes damage once installed (6)
15. Acts as a filter or barrier between your own trusted network and another (8)

|