Across
- 1. Android trusted websites use this type files to create installation software.
- 5. Sensitive information (student records)kept by educational institution.
- 7. chip built onto the motherboard and generates and stores encryption keys to protect boot files.
- 9. Social engineering attack that takes place over the phone.
- 10. An Act that keeps individuals healthcare information private.
- 13. Disables security features of a mobile device.
- 14. Consists of programs that give the hacker root access to the target machine.
- 17. Type of DDoS attack that tries to overload network devices like a firewall.
- 18. Policy allows the administrator to remotely lock the device if it has been lost or stolen.
- 19. Type of authentication that requires two authentication credentials to access an account.
- 20. Collects and then forwards information regarding the victim's computer activities.
- 21. Type of malware is self replicating, modify existing programs, and must be attached to a legitimate program to run.
- 22. Network monitoring device or software that monitors and filters inbound and outbound traffic.
- 27. Targeted phishing attack.
- 28. Used to bypass building access control measures, such as a badge reader.
- 29. Type of detection that the organization is actively looking for security flaws in its systems.
Down
- 2. Type of data destruction that actual destroys the HDD.
- 3. Logs every keystroke the user makes and then sends the keystroke report to the hacker.
- 4. An algorithm that generates a value that represents the password.
- 6. Malware that uses the victim computer's resources to mine for cryptocurrency on behalf of the hacker.
- 7. Program that is hidden inside a legitimate program.
- 8. Most vulnerable part of any network.
- 11. Type of server that exists outside of a network that forwards all traffic through its gateway on the behalf of the user or the network.
- 12. Type of formatting that uses tools in the operating system.
- 15. Type of formatting that writes new sectors and tracks to the drive.
- 16. Immediately removing the device from the network; disconnect shared drives and connections with other devices.
- 23. Scans a victim's computer for files and encrypts the files so the user is unable to access them.
- 24. Occurs when an attacker sends out an email that looks legitimate but has a malicious payload.
- 25. An attacker can gather sensitive information by shoulder surfing on conversations.
- 26. Type of detection that occurs when the security incident is discovered when not actively looking for it.
