Cybersecurity unit 10 and 11 vocabulary
Across
- 2. Software designed to cause damage or gain unauthorized access to a computer or network.
- 3. the process of securing software applications through reducing vulnerabilities.
- 6. A physical security measure where methods like keycards and biometrics are used to authenticate who can access physical infrastructure.
- 9. Malware that is designed to hold data or a computer system hostage until a fee is paid.
- 10. A type of malware that, when executed, is designed to replicate itself and spread to other computers.
- 13. a cybersecurity tool designed to detect and remove viruses
- 14. The process of securing a network by securing access points and strengthening defenses against cyberthreats.
- 15. A type of software that automatically displays or downloads ads to generate revenue.
- 16. A type of malware that secretly installs itself onto a device without the user knowing or consenting.
- 18. Securing an operating system through reducing the attack surface and configuring settings to be more secure.
Down
- 1. Live monitoring of database and server grounds to watch for any suspicious activity
- 4. Securing physical networking infrastructure such as servers and terminals through methods such as physical locks and biometrics.
- 5. securing a database through reducing the attack surface.
- 7. A cybersecurity technique of splitting up a network into multiple different parts to reduce how much is lost in a breach and increase performance.
- 8. A type of malware that spreads across computers automatically without requiring user actions.
- 11. the process of securing an IT system by reducing how many attack entrances there are.
- 12. A cybersecurity tool designed to prevent detect and remove malware.
- 17. A systematic examination of security measures and logs to verify security.