Cybersecurity Practices
Across
- 4. | A security measure that requires more than one form of verification.
- 6. | An attempt to steal personal information by pretending to be a trustworthy entity.
- 8. | A software update that fixes security vulnerabilities.
- 9. | Software designed to detect and remove malware.
- 10. | A vulnerability that is exploited before it is publicly known or patched.
- 11. | A network of infected devices used in cyber attacks.
- 12. | A type of malware that records keystrokes to steal sensitive information.
- 13. Breach | The unauthorized release of confidential information.
- 14. | The process of converting data into a code to prevent unauthorized access.
- 16. Engineering | Manipulating people into giving up confidential information.
- 17. | A type of malware that demands payment to restore data.
- 19. | A security system that monitors and controls incoming and outgoing network traffic.
- 20. | Software that is harmful to a computer system.
Down
- 1. | An attack that overwhelms a system by sending an excessive amount of requests.
- 2. | A weakness in a system that can be exploited by a cyber attacker.
- 3. | An attempt to damage or disrupt a computer system or network.
- 5. | The process of verifying the identity of a user or device.
- 7. | A decoy system set up to attract cyber attackers and study their behavior.
- 15. | Malware disguised as legitimate software.
- 18. | Software that gathers user information without their knowledge.