Cyber Security
Across
- 2. A malicious code that attaches itself to clean files and spreads to other files
- 5. A cryptographic value used to verify data authenticity and integrity
- 8. Software that secretly gathers user information without permission
- 9. A secure connection that encrypts data between a device and a network
- 13. Software designed to harm or exploit any programmable device or network
- 14. Authentication method based on unique biological traits like fingerprints
- 15. An attack that floods a system with traffic, causing a denial of service
- 17. A software vulnerability unknown to the vendor and unpatched
- 18. The process of converting data into a coded form to prevent unauthorized access
- 21. A type of malware disguised as legitimate software
- 22. Malware that locks or encrypts data and demands payment to restore access
- 23. A network of infected computers controlled remotely by hackers
- 25. A secret way of bypassing normal authentication to access a system
- 26. A self-replicating program that spreads through networks
- 28. A test used to differentiate between humans and automated bots
- 29. System that monitors network traffic for suspicious activity
Down
- 1. Any attempt to damage, steal, or disrupt data or computer systems
- 3. Manipulating people into revealing confidential information
- 4. A tool used to store and manage multiple passwords securely
- 6. A person who gains unauthorized access to computer systems
- 7. Software that detects and removes malicious programs
- 10. The process of verifying the identity of a user or system
- 11. A secret word or phrase used to access a system or account
- 12. A cyber attack that tricks users into revealing personal information through fake emails or websites
- 15. The release of sensitive or confidential information to unauthorized people
- 16. Settings that determine what network traffic is allowed or blocked
- 19. An update designed to fix vulnerabilities in software
- 20. A distributed version of a DoS attack using multiple computers
- 24. The key used to encode or decode encrypted data
- 27. A network security system that monitors and controls incoming and outgoing traffic