|
"network security quiz": HTML5 Crossword |
Across2. an infected computer being remotely controlled by a hacker (6)
4. programs that keep track of which adverts you click on and then send a specific advert to your browser (6)
5. the fraudulent use of someone else's name and personal information to obtain credit (8,5)
6. theft, vandalism, flood, fire, earthquake (8,5)
7. a website or email that looks genuine but is designed to trick you into entering your username and password so they can be recorded by a fraudster (8)
9. performed by simulating an attack on the software to see if there are any weaknesses that can be exploited (18)
10. a type of virus that spreads on its own and slows down networks (4)
11. sending official looking emails to get you to download a key logger which records what you type (8)
13. overloading web servers with bogus request (15)
14. a type of malware installed with out the users knowledge in order to collect the users information (7)
15. computer security expert who may sometimes violate laws or typical ethical standards (14)
16. the random transmission of unwanted messages in bulk (4)
18. attacking a data by inserting extra commands (13)
19. a person who gains unauthorized access to a computer by breaking codes and passwords (6)
|
|
Down1. an application that appears to do something useful but in fact actually causes damage once installed (6)
3. the main cause of data loss in an organisation (9)
4. states how the network may be used (20)
8. the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents (16)
12. a method of changing the original numbers and characters so that they are hidden or disguised (10)
17. the general term used to describe software that is designed to disrupt or damage a computer system (7)
|
new
edit
share
pdf:puzzle
pdf:answers
Create an editable copy
ACROSS
2. an infected computer being remotely controlled by a hacker (6)
4. programs that keep track of which adverts you click on and then send a specific advert to your browser (6)
5. the fraudulent use of someone else's name and personal information to obtain credit (8,5)
6. theft, vandalism, flood, fire, earthquake (8,5)
7. a website or email that looks genuine but is designed to trick you into entering your username and password so they can be recorded by a fraudster (8)
9. performed by simulating an attack on the software to see if there are any weaknesses that can be exploited (18)
10. a type of virus that spreads on its own and slows down networks (4)
11. sending official looking emails to get you to download a key logger which records what you type (8)
13. overloading web servers with bogus request (15)
14. a type of malware installed with out the users knowledge in order to collect the users information (7)
15. computer security expert who may sometimes violate laws or typical ethical standards (14)
16. the random transmission of unwanted messages in bulk (4)
18. attacking a data by inserting extra commands (13)
19. a person who gains unauthorized access to a computer by breaking codes and passwords (6)
DOWN
1. an application that appears to do something useful but in fact actually causes damage once installed (6)
3. the main cause of data loss in an organisation (9)
4. states how the network may be used (20)
8. the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents (16)
12. a method of changing the original numbers and characters so that they are hidden or disguised (10)
17. the general term used to describe software that is designed to disrupt or damage a computer system (7)

|