Cybersecurity Terms
Across
- 3. Covert method of bypassing normal authentication.
- 4. Denial of service attack affecting one system.
- 5. Unsolicited Emails.
- 8. Response test to verify human v. bot.
- 9. Secretly installed data gathering software.
- 12. Group of Compromised Internet-connected devices.
- 15. Network protection preventing virus from penetrating.
- 17. Digital form of social engineering using deceit.
- 18. A fundamental unit of computer storage
- 19. Software that monitors for Malware.
Down
- 1. Software designed to harm or exploit.
- 2. Malware preventing file access via Encryption.
- 6. Encrypted sites not indexed by search engines.
- 7. Spyware that records keystrokes.
- 10. Successful hack allows access to files.
- 11. Capturing of Data Packets over network.
- 13. Vulnerability or flaw in a system.
- 14. Denial of service attack affecting multiple systems.
- 16. Attackers posing as a known trusted source.
- 19. Software that earns revenue off advertisements