Cybersecurity Crossword Puzzle
Across
- 2. A type of malware that is designed to look like a legitimate program in order to trick users into downloading it.
- 6. The process of simplifying complex systems by focusing on essential features, hiding unnecessary details.
- 8. A malicious program that can self-replicate and attach itself to other files.
- 12. A symbol, typically '=', used in programming to assign a value to a variable.
- 13. The practice of protecting computers, servers, mobile devices, and networks from malicious attacks.
- 14. A value or variable that is passed to a function or method when it is called.
- 16. A software that generates revenue by automatically displaying online advertisements.
- 17. To verify the identity of a user or system.
Down
- 1. A program or set of rules that protects a network by controlling incoming and outgoing traffic.
- 3. An additional component or feature that can be added to a software program.
- 4. A software program used to prevent, detect, and remove malware.
- 5. CONTROL - A security process that controls and manages who is authorized to access certain resources.
- 7. A malicious program that is designed to damage or gain unauthorized access to a computer system.
- 9. The act of sending fraudulent emails in order to trick people into revealing personal information.
- 10. The sum of all possible points where an unauthorized user can try to enter or extract data from a system.
- 11. POISONING - A type of cyber attack that involves sending false ARP messages to redirect network traffic.
- 12. A character encoding standard used to represent text in computers.
- 15. A protocol used to translate IP addresses into MAC addresses.
- 18. A collection of IP-to-MAC address mappings used to speed up network communication.