Information Security Crossword

1234567891011121314151617181920212223242526
Across
  1. 3. _____ authentication is a security process that relies on the unique biological characteristics of an individual to verify that he is who is says he is.
  2. 5. A software program that is designed to prevent viruses.
  3. 7. Always _____ your computer when you leave your desk.
  4. 11. A program that records which keys a user presses.
  5. 14. a type of malicious software designed to extort money from their victims, by blocking access to the computer or encrypting the data stored on it.
  6. 15. a software tool designed to take advantage of a flaw in a computer system, typically for malicious purposes such as installing malware.
  7. 17. Generates and securely stores complex passwords in one place.
  8. 19. A part of a computer system or network that forms a barrier between a computer and the outside world to prevent intrusion.
  9. 21. a network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data.
  10. 22. In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system.
  11. 23. Email scam or attempt to trick you into giving your password or personal information.
  12. 25. Passwords should be at least this many characters long.
Down
  1. 1. Illegal activity that involves a computer and a network.
  2. 2. A bunch of private computers infected with malicious software and remotely controlled as a group without the owners' knowledge.
  3. 4. _____ were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping cart in an online store).
  4. 6. _____ authentication can help to lower the likelihood of identity theft, as well as phishing scams, because criminals cannot compromise log-ins with usernames and password details alone.
  5. 8. Software that launches unprompted ads on computers or redirects web pages to promotional websites.
  6. 9. Many IoT devices come with _____ usernames and passwords.
  7. 10. a weakness that can be exploited by a Threat Actor.
  8. 12. Similar to a password in usage, but is generally longer for added security.
  9. 13. Short for malicious software.
  10. 16. An attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
  11. 18. Encodes data in such a way that it is unintelligible without a key.
  12. 20. Voice Phishing
  13. 24. This organization provides a policy framework of computer security guidance for how private sector organizations in the United States can assess and improve their ability to prevent, detect, and respond to cyber attacks.
  14. 26. Malware that replicates itself to spread to other computers on the network.