Day 4 Cyber Security 2 Chapter 4
Across
- 1. The unauthorized transfer of data from a computer system.
- 5. A weakness in a system that can be exploited by a threat.
- 7. A hardware device or software program that stops network traffic based on a set of rules.
- 10. A computer that is part of a botnet, controlled by an attacker.
- 11. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- 13. The practice of sending fraudulent emails that resemble emails from reputable sources to induce individuals to reveal personal information.
- 16. The process of verifying the identity of a user.
- 17. A unique identifier for a device on a network (abbreviation).
- 18. A set of rules governing the exchange or transmission of data between devices.
- 21. A secret word or phrase that must be used to gain admission to something.
- 23. A program that appears to do one thing but actually does another, often malicious, thing. (2 words)
- 24. Software that is intended to damage or disable computers and computer systems.
- 25. A system that detects and prevents malicious activities on a network (abbreviation).
Down
- 2. The 'A' in the CIA Triad, ensuring that systems and data are available to authorized users when needed.
- 3. The act of deceiving someone into revealing sensitive information. (2 words)
- 4. The process of making data unreadable to unauthorized users.
- 5. The process of granting or denying approval to use specific resources.
- 6. A type of attack that overwhelms a system with traffic, making it unavailable to users (abbreviation).
- 8. A network security device that monitors and filters incoming and outgoing network traffic.
- 9. A person who uses computers to gain unauthorized access to data.
- 12. A type of malware that holds a victim's data for ransom.
- 14. A program designed to breach the security of a computer system while ostensibly performing some innocuous function.
- 15. Any circumstance or event with the potential to adversely impact organizational operations.
- 18. Unsolicited bulk messages, especially advertising.
- 19. A small piece of data sent from a website and stored on the user's computer by the web browser.
- 20. The 'C' in the CIA Triad, ensuring data is not disclosed to unauthorized individuals.
- 22. An attack that uses a massive number of computers to overwhelm a target system. (abbreviation)