cyber-security-560
Across
- 2. Method of gaining access to accounts by systematically trying all possible password combinations.
- 4. Update to software that fixes vulnerabilities or bugs to improve security and performance.
- 6. Security process requiring two different forms of identification for access. (sigla)
- 7. Vulnerability in software that is exploited before the developer has a chance to fix it.
- 10. Provides secure, encrypted connections over less secure networks.
- 12. Software designed to detect and remove malware from computers.
- 13. Software that secretly monitors and collects information about users without their knowledge.
- 14. System that monitors network traffic for suspicious activities or policy violations.
- 15. General term for any software designed to harm, exploit, or otherwise compromise devices and networks.
- 18. Software or hardware that records every keystroke made on a computer.
Down
- 1. Attack that overloads a system, making it unavailable to legitimate users.
- 3. The process of converting data into a coded form to prevent unauthorized access.
- 5. Hidden way to bypass normal authentication to gain unauthorized access to a system.
- 8. Type of malware that encrypts data and demands a ransom for its release.
- 9. Software or hardware that monitors and controls incoming and outgoing network traffic.
- 11. Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- 16. Network of infected computers that can be remotely controlled by a cybercriminal.
- 17. Malware disguised as legitimate software but allows unauthorized access to a user’s system.