Chapter 6-8 Crossword

1234567891011121314151617181920212223242526272829
Across
  1. 3. the act of granting a user access to a system resource
  2. 5. extra information that describes data, like location information or author information
  3. 6. measurements of the unique characteristics of an individual
  4. 8. a phishing attack aimed at a high-value individual like a CEO
  5. 10. is the act of a user claiming an identity
  6. 11. the most common form of a breach
  7. 15. the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
  8. 18. a physical device assigned to a user that can generate a unique code
  9. 20. a threat actor who gains unauthorized access to a high-value target for an extended period of time
  10. 22. emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
  11. 23. the act of verifying or proving a user's claim to an identity
  12. 24. a type of malware disguised as legitimate software such as a game or a utility application
  13. 25. security principle that ensures information is only modified in an authorized manner
  14. 27. software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
  15. 29. software that provides protection against computer viruses and many other forms of malware
Down
  1. 1. aspect of a computer that can be used to breach security
  2. 2. a case of unauthorized computer access
  3. 4. achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
  4. 7. security principle that ensures information is only disclosed or made available to authorized users
  5. 9. security principle that ensures information is accessible by authorized users whenever required
  6. 12. the process of adding geographical identification to a device
  7. 13. any software developed to compromise the confidentiality, integrity, or availability of data
  8. 14. A standardized set of rules for formatting and processing data
  9. 16. a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
  10. 17. notification sent by an authentication server to a mobile device associated with a user
  11. 19. a protected environment where suspicious files can be run
  12. 21. intelligence derived from publicly available information on an individual or organization
  13. 22. control which users, groups, or services can perform an action on a file
  14. 26. special codes used to decode data
  15. 28. an authentication method that uses only one authentication factor to verify a claimed identity