Cyber Security Crossword
Across
- 2. An attack where an attacker/an unauthorized person simply follows an authorized person to enter the secured premises
- 5. A network security device which blocks malicious traffic from entering the trusted network
- 6. Term used to describe threats that prevents business from achieving its objective
- 8. Malware that hides on the device and spies on the user
- 11. Software used to detect and prevent computer viruses from spreading
- 15. Secured encrypted connection used by a device to connect to a corporate network over the internet
- 16. A type of authentication where verification is based on the physical characteristics of a person
- 18. Person who tries to gain unauthorized access to a network or system
- 21. Updated code for a system or application to fix a security flaw
- 22. The Skyworks department that protects systems and networks from external attacks and leverages an defense in depth approach to ensure the confidentiality, integrity and availability of our systems, data, and information resources
Down
- 1. Process of converting human-readable text to an unintelligible form using a key; process used to protect confidential data
- 3. A flaw/weakness in a system that can be exploited by an attacker
- 4. Process to verify the identity of the user when logging into a system
- 7. The CIA Triad is an information security model that guides an organization’s efforts towards ensuring data security. What does the “I” stand for in the CIA triad?
- 9. Social engineering tactic where attacker masquerades as a trusted entity and tricks people into clicking on a link or providing sensitive information
- 10. Common malware which can easily spread from one computer to another
- 12. Unwanted, unsolicited communication through emails or text messaging
- 13. Secret word or passphrase used to authenticate into a system
- 14. Term for malicious software
- 17. Malware that acts as legitimate program; name of the USC mascot
- 19. A type of malicious software where an attacker encrypts the contents of a victim's computer or block access to data until a ransom is paid
- 20. Most secure way to dispose of paper documents