Cybersecurity Term Bank
Across
- 3. Breach Unauthorized release or theft of information
- 5. Verifying a user’s identity
- 6. Access Terminal Device (screen/keyboard) for interacting with a computer
- 8. Malware that self-replicates and spreads across networks
- 10. Trick users into giving information via fake messages
- 13. Privilege Giving users the minimum access needed
- 17. Instructions that run on hardware to perform tasks
- 18. Device that forwards data between networks
- 19. attacks Flooding a target with traffic to overwhelm it
- 20. Number used by a protocol for communication
- 21. Event with potential to harm systems or data
- 23. Computer providing resources to others
- 25. Reliable access to data and systems
- 26. in Depth Multiple layers of security protection
Down
- 1. Converting plaintext into unreadable code
- 2. Software designed to harm systems or data
- 4. Weakness that can be exploited
- 7. Keeping info accessible only to authorized users
- 9. Reducing features or data exposure
- 11. Ensuring data is accurate and unchanged
- 12. Control Process of granting or denying use of resources
- 14. Information at rest, in use, or in transit
- 15. Malware that spreads by attaching to files/programs
- 16. in the Middle (MITM) Attacker intercepts and alters communication
- 22. Physical parts of a computer
- 24. System that filters network traffic