SEC 150 Review Puzzle

123456789101112131415161718192021
Across
  1. 3. The individual or entity that is responsible for an attack.
  2. 5. Software that infects a computer with malware
  3. 7. Malicious program that uses a computer to replicate
  4. 11. Making something unintelligible
  5. 12. Circumventing the installed built-in limitations on Apple iOS devices
  6. 13. Only authorized parties can view information
  7. 16. The means of persuading or convincing a user in order to gain information
  8. 18. Software or hardware that silently captures all keystrokes taken on a computers keyboard. A form of spyware
  9. 21. Digital platform that threat actors target for their exploits
Down
  1. 1. A secret combination of letters, numbers, and/or characters that only the user should have knowledge of
  2. 2. Obfuscation of sensitive data elements into a random string of characters.
  3. 4. False or inaccurate information that is designed to mislead with malicious intent.
  4. 6. An attack for which there are zero days of warning, and no immediate fix is known
  5. 8. Only authorized parties can change information
  6. 9. A container in which an application is allowed to run without impacting the underlying OS
  7. 10. Downloading unofficial and unapproved apps
  8. 14. An executable program that pretends to be perform normal activities but secretly is doing something malicious
  9. 15. An employee or worker from within an organization that poses a threat
  10. 17. Registering domain names of sites that are spelled close to the actual and legitimate sites
  11. 19. Malware that has the ability to hide its presence and the presence of other malware on a system
  12. 20. Installing software security updates.