Security+ Questions 1
Across
- 2. An attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of
- 4. A function that converts an input (or 'message') into a fixed-size string of bytes, typically a digest that is unique to each unique input. It is used in various security processes to ensure data integrity
- 7. A type of control that are designed to prevent an attacker from attempting to violate security policies
- 8. Procedural mechanisms that focus on the mechanics of the risk management process
- 10. functions or codes that are placed inside of other programs that will activate when set conditions are met instead of independent malicious programs
- 11. Groups of remotely controlled systems that are used by attackers who control them to perform various actions such as additional infections and denial of service attacks
- 12. Malware that takes over a computer then demands a ransom or payment
- 13. Malware that is specifically designed to allow attackers to access a system through a backdoor
Down
- 1. A cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
- 3. The process of converting information or data into a code, especially to prevent unauthorized access. It secures data by making it unreadable without the proper decryption key
- 5. Programs that capture keystrokes from keyboards, mouse movement, touchscreen inputs, or credit card swipes from attached devices
- 6. Methods or tools that provide access that bypasses normal authentication and authorization procedures, allowing attackers access to systems, devices, or applications
- 9. A term that describes a wide range of software that is intentionally designed to cause harm to systems and devices, networks, or users