Across
- 1. A type of cyberattack that overwhelms a service with traffic from multiple sources. (acronym)
- 3. A service that creates a secure connection over the internet, often used for privacy. (acronym)
- 7. Device used to secure doors or containers, often requiring a key or combination. (1 word)
- 8. Software that detects and removes malicious software from a computer. (1 word)
- 12. Software designed to disrupt, damage, or gain unauthorized access to systems. (1 word)
- 13. Device used to watch and record activity in a specific area for safety purposes.(2 words)
- 16. The process of converting data into a fixed-size string of characters, typically for data integrity.(1 word)
- 17. A type of malware that locks users out of their data, demanding payment for access. (1 word)
- 18. Unique pattern of ridges and valleys on the skin of a finger, used for identification.
- 21. The process of converting information into a code to prevent unauthorized access. (1 word)
- 24. A list of trusted entities or applications that are granted access. (1 word)
Down
- 1. An attack aimed at making a service unavailable to its intended users. Also called a DoS attack (3 words)
- 2. A method of bypassing normal authentication, often used for malicious purposes. (1 word)
- 4. Ethan and Brian make up this team (2 words)
- 5. A cryptographic method to verify the authenticity and integrity of a message or document. (2 words)
- 6. Software that secretly monitors user activity and collects personal information. (1 word)
- 9. Team that handles SBLI's tech (acronym)
- 10. Manipulating individuals into divulging confidential information. (2 words)
- 11. A software update designed to fix vulnerabilities or bugs. (1 word)
- 14. Malware disguised as legitimate software to trick users into installing it. (1 word)
- 15. Strategies and tools designed to prevent data breaches and ensure sensitive information is not lost. (3 words)
- 19. A weakness in a system that can be exploited by threats. (1 word)
- 20. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity. (1 word)
- 22. A network security system that monitors and controls incoming and outgoing traffic. (1 word)
- 23. An incident where unauthorized access to data occurs. (1 word)
