|
"System and network threts": HTML5 Crossword |
Across1. the unwanted transmission of unwanted messages in bulk (4)
4. useful for maintaining security and for recovering lost data (11)
5. A type of virus that spreads on its own and slows down networks (4)
6. an infected computer that is remotely controlled by a hacker (6)
7. when testers are given no more information than any potential hacker may have (15)
8. a Website or email that tricks you into entering your username and password so that it can be recorded and used by the fraudster (8)
10. testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system (15)
11. theft, vandalism, natural disasters, flood , fire , earthquake (13,0)
13. a class of malware designed specifically to automate cybercrime usually for the purpose for making fraudulent transactions (9)
16. the general term used to describe software that is designed to disrupt or damage a computer software (7)
17. Acts as a filter or barrier between your own trusted network and another (8)
18. A person who gains unauthorised access to a computer system by breaking codes and passwords (6)
|
|
Down1. a type of malware installed without the users knowledge in order to collect the users private information (7)
2. Similar to police forensics, network administrators can use audit trail data to solve data mysteries (16)
3. an application that appears to be something useful but in fact it actually causes damage once installed (6)
9. an email that tricks you into handing over sensitive or personal information (13)
12. The fraudulent use of someone else's name and personal information to obtain credit loans etc (13)
14. the main cause of data loss in an organisation (9)
15. programs that keep track of which advertisements you click on and then send specific advertisements to your browser (6)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
1. the unwanted transmission of unwanted messages in bulk (4)
4. useful for maintaining security and for recovering lost data (11)
5. A type of virus that spreads on its own and slows down networks (4)
6. an infected computer that is remotely controlled by a hacker (6)
7. when testers are given no more information than any potential hacker may have (15)
8. a Website or email that tricks you into entering your username and password so that it can be recorded and used by the fraudster (8)
10. testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system (15)
11. theft, vandalism, natural disasters, flood , fire , earthquake (13,0)
13. a class of malware designed specifically to automate cybercrime usually for the purpose for making fraudulent transactions (9)
16. the general term used to describe software that is designed to disrupt or damage a computer software (7)
17. Acts as a filter or barrier between your own trusted network and another (8)
18. A person who gains unauthorised access to a computer system by breaking codes and passwords (6)
DOWN
1. a type of malware installed without the users knowledge in order to collect the users private information (7)
2. Similar to police forensics, network administrators can use audit trail data to solve data mysteries (16)
3. an application that appears to be something useful but in fact it actually causes damage once installed (6)
9. an email that tricks you into handing over sensitive or personal information (13)
12. The fraudulent use of someone else's name and personal information to obtain credit loans etc (13)
14. the main cause of data loss in an organisation (9)
15. programs that keep track of which advertisements you click on and then send specific advertisements to your browser (6)

|