Information Security Terms

12345678910111213141516
Across
  1. 2. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. 4. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. 6. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. 8. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. 11. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. 13. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. 15. The process of converting data into a code to prevent unauthorized access.
  8. 16. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. 1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. 3. Software designed to detect and remove malicious software from a computer.
  3. 5. The process of verifying the identity of a user, system, or device.
  4. 7. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. 9. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. 10. A network security device that monitors and controls incoming and outgoing network traffic.
  7. 12. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. 14. A software update designed to fix vulnerabilities or improve security.