Cybersecurity
Across
- 3. Individually identifiable health information in the form of electronic data, paper records, or even spoken conversation.
- 7. Cookie that exists only as long as the web browser is open.
- 9. All points or areas in a system that could be used or compromised to allow hackers entry into the system.
- 10. The actions of malicious code
- 11. Flaw that exists in software when it was released and remains unknown until it is exploited by hackers.
- 13. Changes to a system are tracked by which user account made them.
- 14. Having multiple levels of protection.
- 16. Digging through trash for useful information.
- 18. Ransomware automatically downloaded when a user visits a web page that is infected.
- 19. A macro that has been programmed to carry out a malicious intent.
- 21. Cookie that originates from a visit to a website, but references a different website.
- 23. Malware that changes its characteristics in attempts to avoid detection from antivirus programs.
- 24. Cookie that stays on the computer until an expiration date is met.
- 25. Software embedded on hardware devices to control the system.
- 26. Malware hidden inside other software that appears to be harmless.
- 27. Help break down the aspects of a business and security domains into manageable task areas and tasks to organize protection against cybersecurity threats.
- 29. A virus that infects a computer before the operating system loads.
- 31. Malware that allows the hacker to use an embedded backdoor to gain administrative control of the victim's computer.
- 32. Computer code intentionally written to cause some form of harm;
- 33. Using social tools and technk1ues to obtain information.
- 35. The three underlying principles of data protection: confidentiality, integrity, and availability.
- 37. Set of regulations from credit card vendors that apply to businesses using their services; an industry standard, not a law.
- 39. The state of data being I complete or uncorrupted; also the honesty of a person's actions.
- 40. A flaw or potential for harm.
- 41. Law ensuring financial businesses protect consumer’s private data.
- 43. Following the rules or standards that have been established.
- 44. Law dealing with unauthorized access of computers.
- 45. methodology An approach to finding previously undetected unwanted programs or variants of known viruses through a learning approach.
- 46. Malware designed to prevent security analysts from reading the source code by attempting to prevent access to or disassembly of the code itself.
- 47. Law protecting wire and electronic transmissions of data.
Down
- 1. Cookie that can only be sent using an encrypted session.
- 2. Information about a person left behind by hi~ or her actions on the Internet.
- 4. Law protecting electronic medical records and personal health information.
- 5. Something that takes a vulnerability to a level where the flaws can be exploited
- 6. Technology that tracks a 4ser's keystrokes on the keyboard.
- 8. Computing technology incorporated into nontypical devices to allow communication with other devices and the Internet.
- 12. Statement of if the site uses cookies and, if so, how.
- 15. Malware that deploys its payload when a date or time occurs.
- 17. Digital or electronic platform for health records.
- 20. Malware deployed when conditions exist that the malware is seeking.
- 22. The condition of being private or secret.
- 28. Using a lie or scam to obtain private information.
- 30. Software installed on a computer that collects data on the user and then redirects advertising sites to the web browser.
- 34. Malware that encrypts the user's data; also called ransomware.
- 36. A secret or unknown access point of entry into a system.
- 38. Law preventing company executives from hiding or destroying electronic records
- 42. Encrypts data, rather than stealing or destroying, to prevent user access unless a fee is paid to the hacker;