Across
- 3. Isolated environment used to test suspicious files.
- 6. Malware that locks files and demands payment for their release.
- 7. An extra layer of authentication beyond just a password.
- 8. Electronic document used to prove identity online.
- 10. A facility where security professionals monitor and respond to threats.
- 16. Manipulating people to reveal confidential information.
- 20. A security flaw that is exploited before a patch is available.
- 25. Attack where a hacker intercepts communication between two parties.
- 26. An attack that overwhelms a system with massive traffic.
- 27. Malicious software designed to damage or gain unauthorized access to systems.
- 28. The process of converting data into a secret code for protection.
- 29. Software that records everything typed on a keyboard.
Down
- 1. Tool that securely stores and generates complex passwords.
- 2. Security risk posed by someone within an organization.
- 3. Software that secretly collects information about a user’s activity.
- 4. A decoy system set up to lure and study hackers.
- 5. A process that converts data into a fixed-length string for security.
- 9. A type of malware disguised as legitimate software.
- 11. A tool that creates a secure, encrypted connection over the internet.
- 12. A self-replicating program that spreads through networks.
- 13. A simulated cyberattack to test security defenses.
- 14. A network of compromised computers controlled by an attacker.
- 15. A system that collects and analyzes security event data in real-time.
- 17. A security barrier that controls incoming and outgoing network traffic.
- 18. Malware that hides deep in the system to avoid detection.
- 19. A hidden method of bypassing normal authentication.
- 21. A cyberattack that tricks users into giving away personal information via fake emails or websites.
- 22. A software update that fixes security vulnerabilities.
- 23. Software that displays unwanted advertisements on a device.
- 24. A trial-and-error attack to guess passwords.
