Cybersecurity unit 10 and 11 vocabulary

123456789101112131415161718
Across
  1. 2. Software designed to cause damage or gain unauthorized access to a computer or network.
  2. 3. the process of securing software applications through reducing vulnerabilities.
  3. 6. A physical security measure where methods like keycards and biometrics are used to authenticate who can access physical infrastructure.
  4. 9. Malware that is designed to hold data or a computer system hostage until a fee is paid.
  5. 10. A type of malware that, when executed, is designed to replicate itself and spread to other computers.
  6. 13. a cybersecurity tool designed to detect and remove viruses
  7. 14. The process of securing a network by securing access points and strengthening defenses against cyberthreats.
  8. 15. A type of software that automatically displays or downloads ads to generate revenue.
  9. 16. A type of malware that secretly installs itself onto a device without the user knowing or consenting.
  10. 18. Securing an operating system through reducing the attack surface and configuring settings to be more secure.
Down
  1. 1. Live monitoring of database and server grounds to watch for any suspicious activity
  2. 4. Securing physical networking infrastructure such as servers and terminals through methods such as physical locks and biometrics.
  3. 5. securing a database through reducing the attack surface.
  4. 7. A cybersecurity technique of splitting up a network into multiple different parts to reduce how much is lost in a breach and increase performance.
  5. 8. A type of malware that spreads across computers automatically without requiring user actions.
  6. 11. the process of securing an IT system by reducing how many attack entrances there are.
  7. 12. A cybersecurity tool designed to prevent detect and remove malware.
  8. 17. A systematic examination of security measures and logs to verify security.