CWO Crossword
Across
- 1. Management The process of identifying, assessing, and prioritizing security risks
- 4. A self-replicating malware that spreads through a network
- 5. Malware that locks a user’s data until a ransom is paid
- 11. Detection A system that monitors network traffic for suspicious activity
- 12. A type of malware disguised as legitimate software
- 15. A network of infected computers controlled remotely by an attacker
- 16. Team The group responsible for defending an organization against attacks
- 19. A hidden method of bypassing security to gain access to a system
- 22. Software designed to damage or disrupt a computer system
- 23. of Service An attack that makes a service unavailable by overwhelming it with traffic
- 24. Threat A security risk that comes from within the organization
- 26. The process of verifying the identity of a user or system
Down
- 2. Software that secretly monitors user activity and collects information
- 3. A type of attack where fraudulent emails are sent to steal personal information
- 6. Software designed to detect and remove malicious software
- 7. Authentication A security system requiring more than one method of authentication
- 8. A network security system that monitors and controls incoming and outgoing traffic
- 9. Engineering Manipulating individuals into divulging confidential information
- 10. An isolated testing environment used to run and analyze untrusted programs
- 13. A software update that fixes security vulnerabilities
- 14. Malware that records keystrokes to steal information
- 17. The process of converting data into a secure code to prevent unauthorized access
- 18. Control A method of ensuring that only authorized users can access resources
- 20. Team A group that simulates attacks to test the security of systems
- 21. Software or hardware designed to block unauthorized access to a network
- 25. An attack where multiple systems flood the bandwidth of a targeted system