Across
- 3. is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- 7. communications standard that enables application programs and computing devices to exchange messages over a network.
- 12. the capacity at which a network can transmit data.
- 13. a cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software (malware)
- 15. is a malware designed to deny a user or organization access to files on their computer.
- 18. the smallest unit of a digital image or graphic that can be displayed and represented on a digital display device.
- 19. a computer network security system that restricts internet traffic in, out, or within a private network.
- 21. storage mode of computer data storage in which digital data is stored on servers in off-site locations.
- 22. any kind of unwanted, unsolicited digital communication that gets sent out in bulk
- 23. a system of signals or symbols for communication.
- 24. refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.
- 25. malware designed to collect online banking credentials and other sensitive information from infected machines
Down
- 1. technique used by fraudsters to get control of your phone number.
- 2. the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
- 4. software used by cybercriminals to gain control over a target computer or network.
- 5. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
- 6. is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
- 8. is a type of security measure known as challenge-response authentication.
- 9. A computer program that can copy itself and infect a computer without permission or knowledge of the user
- 10. information that has been translated into a form that is efficient for movement or processing
- 11. the method by which information is converted into secret code that hides the information's true meaning.
- 14. he hidden collective of internet sites only accessible by a specialized web browser.
- 16. a formal request to an authority for something
- 17. an attack that fools users into thinking they are clicking on one thing when they are actually clicking on another.
- 20. The process of verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
