Cybersecurity 2 Honors Vocab

12345678910111213141516171819
Across
  1. 4. = files that appear to be legitimate programs, but really contain malicious code.
  2. 6. = a broader, often scheduled release of software that includes, but is not limited to, patches.
  3. 8. = specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access Vulnerability = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).Vulnerability = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
  4. 12. = the process of converting readable data (plaintext) into an unreadable, scrambled format (ciphertext) using cryptographic algorithms.
  5. 15. = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
  6. 18. = refers to the extent to which individuals understand that there are potential threats to the information systems they use and the measures they should take to mitigate those threats.
  7. 19. = a collection of internet connected devices such as computers, smartphones, or IoT devices infected with malware and controlled remotely by a single attacker
Down
  1. 1. = proactive strategies, policies, and technologies implemented to reduce the likelihood and impact of cyber threats on an organization's digital assets
  2. 2. = the process of securing a system by reducing its surface of vulnerability
  3. 3. = program that blocks access to files or block use of the device until a ransom is paid
  4. 5. = a network security system that acts as a barrier between a trusted internal network and untrusted external networks (like the Internet).
  5. 7. = any potential malicious act, event, or person aiming to illegally access, damage, disrupt, or steal data, networks, or digital devices
  6. 9. = a set of rules, regulations, and guidelines that dictate how an organization protects its data and IT infrastructure.
  7. 10. Day = an attack that takes advantage of code flaws that have VERY recently been discovered.
  8. 11. = The use of bogus emails and websites to trick you into confidential information
  9. 13. = is a programmatic approach to educating staff on information security risks, including e-learning, newsletters, and simulations (e.g., phishing campaigns) to change behavior and reduce human error.
  10. 14. = a set of changes (code updates) to a computer program or its supporting data designed to update, fix, or improve it.
  11. 16. Control = a security method that regulates who or what can view or use resources in a computing environment.
  12. 17. = any code or application designed to damage, disrupt, or steal data from computer systems