CIS101 Cybersecurity Questions by Cale Therault

1234567891011121314151617181920
Across
  1. 4. A technology that creates a secure, encrypted connection over a less secure network, such as the internet.
  2. 5. The process of identifying, analyzing, and evaluating potential risks to a system.
  3. 6. A method of authentication that require two or more methods to gain access.
  4. 7. Unsolicited or undesired electronic messages, typically email.
  5. 10. The practice and study of techniques for secure communication in the presence of adversaries.
  6. 12. The process of verifying the identity of a user or system.
  7. 14. A socially engineered cyberattack where an attacker attempts to trick individuals into revealing sensitive information, often through deceptive emails or websites.
  8. 17. Software designed to detect, prevent, and remove malicious software.
  9. 18. An incident where unauthorized access to data or systems occurs.
  10. 19. Short for malicious software.
  11. 20. A software update released to fix vulnerabilities and bugs.
Down
  1. 1. A cyber attack made from numerous compromised computer systems.
  2. 2. An attempt to disrupt, damage, or gain unauthorized access to various computer systems.
  3. 3. The process of converting data into code, especially to prevent unauthorized access.
  4. 8. Making full use of and/or derive benefit from a resource.
  5. 9. A weakness or flaw in a system that can be exploited by a threat.
  6. 11. A type of malware that maliciously encrypts files and demands money for release.
  7. 13. A potential danger that might exploit a vulnerability to breach security.
  8. 15. A type of malicious software that attaches itself to legitimate programs and spreads to other computers.
  9. 16. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.