Across
- 2. A digital document used to verify the identity of a user or device online
- 6. Software used to detect, prevent, and remove malicious software
- 9. A security risk that originates from within the organization, often involving employees
- 12. A tool that records keystrokes on a keyboard, often used to steal sensitive information
- 13. The process of verifying a user or device
- 14. A person who uses technical skills to exploit systems or networks
- 16. The unauthorized access and retrieval of sensitive information from a system
- 18. A type of malware that locks users out of their systems until a ransom is paid
- 20. A hidden way of bypassing security controls in a system
- 21. A string of characters used to authenticate access to a system or account
Down
- 1. A software update designed to fix vulnerabilities or bugs
- 2. An attempt to damage, disrupt, or gain unauthorized access to a computer or network
- 3. Software designed to disrupt, damage, or gain unauthorized access to a computer system
- 4. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
- 5. A network security system that monitors and controls incoming and outgoing traffic
- 7. A vulnerability in software that is taken advantage of by hackers to carry out attacks
- 8. A virtual private network that allows secure remote access to a network over the internet
- 10. The use of deception to manipulate individuals into divulging confidential information
- 11. The process used by an organization to handle and recover from a cyberattack
- 15. An additional security layer that requires a second form of verification beyond a password
- 17. The process of converting information or data into a code to prevent unauthorized access
- 19. Software that gathers information from a user's device without their knowledge