Information Security Crossword
Across
- 3. _____ authentication is a security process that relies on the unique biological characteristics of an individual to verify that he is who is says he is.
- 5. A software program that is designed to prevent viruses.
- 7. Always _____ your computer when you leave your desk.
- 11. A program that records which keys a user presses.
- 14. a type of malicious software designed to extort money from their victims, by blocking access to the computer or encrypting the data stored on it.
- 15. a software tool designed to take advantage of a flaw in a computer system, typically for malicious purposes such as installing malware.
- 17. Generates and securely stores complex passwords in one place.
- 19. A part of a computer system or network that forms a barrier between a computer and the outside world to prevent intrusion.
- 21. a network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data.
- 22. In recent years, this term has been applied to those who exploit security vulnerabilities to try and break into a computer system.
- 23. Email scam or attempt to trick you into giving your password or personal information.
- 25. Passwords should be at least this many characters long.
Down
- 1. Illegal activity that involves a computer and a network.
- 2. A bunch of private computers infected with malicious software and remotely controlled as a group without the owners' knowledge.
- 4. _____ were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping cart in an online store).
- 6. _____ authentication can help to lower the likelihood of identity theft, as well as phishing scams, because criminals cannot compromise log-ins with usernames and password details alone.
- 8. Software that launches unprompted ads on computers or redirects web pages to promotional websites.
- 9. Many IoT devices come with _____ usernames and passwords.
- 10. a weakness that can be exploited by a Threat Actor.
- 12. Similar to a password in usage, but is generally longer for added security.
- 13. Short for malicious software.
- 16. An attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
- 18. Encodes data in such a way that it is unintelligible without a key.
- 20. Voice Phishing
- 24. This organization provides a policy framework of computer security guidance for how private sector organizations in the United States can assess and improve their ability to prevent, detect, and respond to cyber attacks.
- 26. Malware that replicates itself to spread to other computers on the network.