Cybersecurity terms
Across
- 3. the process of converting plaintext data into a coded format to prevent unauthorized access
- 6. a type of malicious software that automatically downloads advertisements on a device
- 7. process of converting data into a fixed-size string of characters for unique identificaton
- 12. a type of malicious software that disguises itself as legitimate or useful software
- 13. the process of monitoring network or system activities for malicious activities
- 15. technique that isolates applications or processes in a controlled environment
Down
- 1. a type of malicious software or hardware that records keystrokes made by a user
- 2. a security approach that allows only pre-approved users to access a network
- 4. an incident of unauthorized access to sensitive, protected or confidential data
- 5. the practice of securing information by transforming it into an unreadable format
- 8. a network of compromised computers that are controlled remotely by a hacker to perform automated tasks
- 9. a malicious software designed to gain unauthorized access to a network while hiding its presence
- 10. a software update designed to fix vulnerabilities, bugs, or improve functionality
- 11. any device that connects to a network and serves as a point of entry for data
- 14. a simulated cyber attack on a system conducted to identify and vulnerabilities