Security Terminology Puzzle (Participation 3) - Emily Pedrazzi
Across
- 4. Many devices attack a target.
- 5. Creates an encrypted tunnel.
- 8. Many compromised computers sending cyberattacks.
- 10. Detects and protects against malware.
- 11. Pay to regain access to systems.
- 13. Malicious software.
- 14. Tricks users into providing information.
- 15. Attack that exploits new vulnerabilities.
- 17. Cisco's entry-level network certification.
- 18. Someone who exploits vulnerabilities.
- 20. Someone who penetration tests organizations.
Down
- 1. Scrambles sensitive data; must decrypt.
- 2. Saves hardware costs; increases risk.
- 3. Legitimate app containing harmful malware.
- 6. Free Internet access.
- 7. Falsified media used for harm.
- 9. Blocks unusual traffic and users.
- 12. CompTIA's entry-level security certification.
- 16. Sensitive information exposed to attackers.
- 19. Requires users to confirm identity.