Cybersecurity
Across
- 2. Code used to take advantage of a vulnerability
- 4. Isolated environment used to test software safely
- 5. Hidden method to bypass normal authentication
- 6. Malware that hides its presence and grants admin access
- 10. Device that filters network traffic to enhance security
- 12. Malicious software designed to harm or compromise systems
- 13. Network of infected devices controlled remotely
- 18. Deceptive technique to steal confidential information
- 19. Manipulation technique to trick people into giving information
- 20. Detection of unauthorized access or suspicious activity
- 21. Unauthorized access to confidential data
- 23. Process of verifying the identity of a user or device
- 24. Attack that floods a network or server to disrupt service
- 25. Deliberate attempt to damage or access a computer system
- 27. Program that records every keystroke typed
- 28. Impersonation technique to deceive systems or users
- 29. Security method that requires two forms of identification
Down
- 1. Rule-based barrier that blocks or allows network traffic
- 3. Process of converting data into an unreadable format for protection
- 7. Digital file used to prove the identity of a website or user
- 8. Update to fix security vulnerabilities in software
- 9. Malware that encrypts files and demands payment for access
- 11. Software that detects and removes malicious programs
- 14. Virtual private network that encrypts internet connections
- 15. Weakness in a system that can be exploited by attackers
- 16. Function that converts data into a fixed-size string
- 17. Vulnerability unknown to developers and without a fix
- 22. Decoy system used to lure and monitor attackers
- 26. Malware disguised as legitimate software
- 28. Software that secretly collects user information