Introduction to Cyber Security
Across
- 2. An attack that takes advantage of a previously unknown vulnerability in software or hardware before the vendor has released a patch or fix.
- 5. The process of converting data into a code to prevent unauthorized access. Only those with the decryption key can access the original data.
- 6. Short for "malicious software," malware refers to any software specifically designed to harm or exploit a computer, network, or device. Examples include viruses, worms, and ransomware.
- 8. A weakness in a system, application, or network that can be exploited by attackers to gain unauthorized access or cause harm.
- 9. The manipulation or deception of individuals into divulging confidential information, often used in phishing and other types of attacks.
- 10. A type of malware that encrypts a victim's data and demands a ransom payment in exchange for the decryption key.
Down
- 1. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, designed to block unauthorized access while permitting legitimate communication.
- 3. The process of verifying the identity of a user, device, or system before granting access to resources. Common methods include passwords, biometrics, or multi-factor authentication (MFA).
- 4. A type of social engineering attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information like passwords, credit card numbers, or personal data.
- 7. A cyberattack aimed at disrupting the normal operation of a network or server by overwhelming it with excessive traffic, causing it to become unavailable to legitimate users.