Your Path to Security
Across
- 4. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- 6. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself
- 9. A compromised computer connected to the internet that performs malicious activities
- 10. Unauthorized user who attempts to or gains access to an information system
- 13. The fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
Down
- 1. a general category of services related to cloud computing and remote access
- 2. A circumstance or event that has or indicates the potential to exploit vulnerabilities
- 3. Distributed Denial-of-Service
- 5. An attempt to gain unauthorized access
- 7. Software that compromises the operation of a system
- 8. the fabrication of a false online identity by a cybercriminal for the purposes of deception
- 11. The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence
- 12. A computer program that can replicate itself, infect a computer without permission or knowledge of the user