malware - Its uses malicious software which is designed to disrupt, damage or gain unauthorized access to a computer system., phishing - The fraudulent practice of sending emails purporting to be from a reputable companies in order to induce individuals to reveal personal information., bruteforceattacks - A trial and error method of attempting passwords and pin numbers. Automated software is used to generate a large number of consecutive guesses., dos - A network attack which stops users from accessing a part of a network by persistently hitting a network to stop it from working., datainterception - The unauthorised act of stealing computer based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information., SQLinjection - A technique used to view change data by adding addition code creating a different search string., poornetworkpolicy - When the rules and procedures to prevent vulnerabilities and attacks is not good enough to combat all threats., penetrationtesting - When organisations employ specialists to simulate potential attacks, under controlled testing to identify potential weaknesses with results being reported back., networkforensics - Investigations undertaken to find the causes of attacks which involves examining data sent over a network., packetsniffing - The interception of packets on a network to identify what data is being sent across a network at a given time without permission., networkpolicies - If done correctly this will outline clear rules and regularly test to find and fix weaknesses., antimalwaresoftware - Software with the aim of preventing malware which includes antivirus software which isolate and destroy computer viruses., firewalls - Software that performs a ‘barrier’ between a potential attacker and the computer system and is used to block unauthorised access and stop processes which may be viewed as a threat., useraccesslevels - Allows a system administrator to set up a hierarchy of users that controls which part of the network different group of users can access., passwords - Typically a string of characters used to gain access to a service or system., biometrics - used in addition to ‘standard’ password entry, encryption - Where data is translated into code so that only authorised users, or users with the key can decrypt it., caesarcypher - Works by encrypting messages through movement of each letter a certain number of places to the left in the alphabet.,

Malware Keywords crossword

Leaderboard

Visual style

Options

Switch template

Continue editing: ?