25 Cyber Security Facts

12345678910111213141516171819202122232425
Across
  1. 3. is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  2. 7. communications standard that enables application programs and computing devices to exchange messages over a network.
  3. 12. the capacity at which a network can transmit data.
  4. 13. a cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software (malware)
  5. 15. is a malware designed to deny a user or organization access to files on their computer.
  6. 18. the smallest unit of a digital image or graphic that can be displayed and represented on a digital display device.
  7. 19. a computer network security system that restricts internet traffic in, out, or within a private network.
  8. 21. storage mode of computer data storage in which digital data is stored on servers in off-site locations.
  9. 22. any kind of unwanted, unsolicited digital communication that gets sent out in bulk
  10. 23. a system of signals or symbols for communication.
  11. 24. refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.
  12. 25. malware designed to collect online banking credentials and other sensitive information from infected machines
Down
  1. 1. technique used by fraudsters to get control of your phone number.
  2. 2. the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
  3. 4. software used by cybercriminals to gain control over a target computer or network.
  4. 5. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
  5. 6. is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
  6. 8. is a type of security measure known as challenge-response authentication.
  7. 9. A computer program that can copy itself and infect a computer without permission or knowledge of the user
  8. 10. information that has been translated into a form that is efficient for movement or processing
  9. 11. the method by which information is converted into secret code that hides the information's true meaning.
  10. 14. he hidden collective of internet sites only accessible by a specialized web browser.
  11. 16. a formal request to an authority for something
  12. 17. an attack that fools users into thinking they are clicking on one thing when they are actually clicking on another.
  13. 20. The process of verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.