Ch. 14 Security Crossword

1234567891011121314151617181920212223242526272829
Across
  1. 1. Android trusted websites use this type files to create installation software.
  2. 5. Sensitive information (student records)kept by educational institution.
  3. 7. chip built onto the motherboard and generates and stores encryption keys to protect boot files.
  4. 9. Social engineering attack that takes place over the phone.
  5. 10. An Act that keeps individuals healthcare information private.
  6. 13. Disables security features of a mobile device.
  7. 14. Consists of programs that give the hacker root access to the target machine.
  8. 17. Type of DDoS attack that tries to overload network devices like a firewall.
  9. 18. Policy allows the administrator to remotely lock the device if it has been lost or stolen.
  10. 19. Type of authentication that requires two authentication credentials to access an account.
  11. 20. Collects and then forwards information regarding the victim's computer activities.
  12. 21. Type of malware is self replicating, modify existing programs, and must be attached to a legitimate program to run.
  13. 22. Network monitoring device or software that monitors and filters inbound and outbound traffic.
  14. 27. Targeted phishing attack.
  15. 28. Used to bypass building access control measures, such as a badge reader.
  16. 29. Type of detection that the organization is actively looking for security flaws in its systems.
Down
  1. 2. Type of data destruction that actual destroys the HDD.
  2. 3. Logs every keystroke the user makes and then sends the keystroke report to the hacker.
  3. 4. An algorithm that generates a value that represents the password.
  4. 6. Malware that uses the victim computer's resources to mine for cryptocurrency on behalf of the hacker.
  5. 7. Program that is hidden inside a legitimate program.
  6. 8. Most vulnerable part of any network.
  7. 11. Type of server that exists outside of a network that forwards all traffic through its gateway on the behalf of the user or the network.
  8. 12. Type of formatting that uses tools in the operating system.
  9. 15. Type of formatting that writes new sectors and tracks to the drive.
  10. 16. Immediately removing the device from the network; disconnect shared drives and connections with other devices.
  11. 23. Scans a victim's computer for files and encrypts the files so the user is unable to access them.
  12. 24. Occurs when an attacker sends out an email that looks legitimate but has a malicious payload.
  13. 25. An attacker can gather sensitive information by shoulder surfing on conversations.
  14. 26. Type of detection that occurs when the security incident is discovered when not actively looking for it.