Crossword
Across
- 4. Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- 7. The process of extracting information and data from computers while preserving its integrity and maintaining a strict chain of custody.
- 11. The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- 12. A method of trying to gather personal information using deceptive e-mails and websites.
- 13. A simulated cyber attack against your computer system to check for exploitable vulnerabilities.
- 15. A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
- 16. A device or software application that monitors a network or systems for malicious activity or policy violations.
- 17. A cyber attack that occurs on the same day a vulnerability is discovered in software.
- 18. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 19. A service that encrypts your internet traffic and protects your online identity.
Down
- 1. Malicious software designed to harm, exploit, or otherwise compromise a computer system.
- 2. An extra layer of security used to ensure that people trying to gain access to an online account are who they say they are.
- 3. A trial-and-error method used to decode encrypted data such as passwords.
- 5. An attack that aims to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
- 6. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- 8. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 9. A code injection technique that might destroy your database.
- 10. The process of converting information or data into a code, especially to prevent unauthorized access.
- 12. management The process of managing a network of computers by regularly performing system updates and deploying software patches to fix vulnerabilities.
- 14. A type of malware that threatens to publish the victim's data or block access to it unless a ransom is paid.