Cybersecurity
Across
- 7. A prolonged, targeted attack where intruders gain access to a network and remain undetected.
- 12. Requiring more than one method to verify a user's identity.
- 13. A network of hijacked computers used to launch attacks like DDoS.
- 16. A security system that monitors and controls incoming and outgoing network traffic.
- 17. Any device connected to a network, such as laptops, phones, or servers.
- 19. Software designed to disrupt, damage, or gain unauthorized access.
- 20. Disguising a communication from an unknown source as being from a known, trusted source.
- 21. Authorized simulated attacks on a system to evaluate its security.
- 22. The process of verifying the identity of a user or system.
- 23. The process of acquiring, testing, and installing code changes (patches) to fix vulnerabilities.
Down
- 1. The unauthorized release or access of sensitive information.
- 2. Using fraudulent emails or websites to trick users into revealing sensitive data.
- 3. Routine practices to maintain system health and security.
- 4. A method of guessing passwords or encryption keys through massive trial-and-error.
- 5. A secure, encrypted connection between a user and a private network.
- 6. Manipulating people into performing actions or divulging confidential information.
- 8. Overwhelming a system with traffic to make it unavailable.
- 9. Converting data into a coded form to prevent unauthorized access.
- 10. Tools and processes to ensure sensitive data is not lost, misused, or accessed by unauthorized users.
- 11. confidentiality, integrity, availability
- 14. A security framework based on the philosophy "never trust, always verify"
- 15. Malware that encrypts files and demands payment for the decryption key.
- 18. Evidence on a network or operating system that indicates a security breach.