Chapter 5 Key Terms Crossword - CS 12

1234567891011121314151617181920
Across
  1. 3. type of social engineering attack that appears as a trustworthy entity in digital communication but steals user data, such as login credentials and financial information
  2. 5. software that enables attackers to have access to a system masquerading as operating system processes
  3. 8. device that forwards data packets to the appropriate parts of a computer network
  4. 9. tool or technology often used maliciously to capture keystrokes on a computer to obtain sensitive information such as passwords
  5. 13. fundamental rule or procedure that governs communication between devices in a network
  6. 15. process of transforming legible data into a coded format, making it unreadable to unauthorized entities
  7. 16. program that conceals itself as a safe program but often carries many other different types of malicious payloads
  8. 17. malicious software designed to damage, exploit, infect systems, or otherwise compromise data, devices, users, or networks, using viruses, worms, and spyware that is installed into the basic input-output system (BIOS) of a computer
  9. 18. network security system that uses security rules to monitor and control incoming and outgoing traffic
  10. 19. practice of protecting systems, networks, devices, and data from online threats
  11. 20. process of converting data into a fixed-size string of characters, typically used for security purposes to ensure data integrity
Down
  1. 1. device that connects and segments various components within a local network
  2. 2. logically visible subdivision of an IP network, increasing its efficiency and security
  3. 4. powerful computer or computer program that provides data to other computers (clients) over a network
  4. 6. stand-alone software program that spreads without requiring a host program
  5. 7. process of verifying the identity of a user or device, often through credentials such as passwords or digital certificates
  6. 10. type of malicious software that encrypts users’ files such as photos, documents, or other sensitive information and demands a ransom for their release
  7. 11. social engineering attack that involves creating a fabricated scenario to obtain private data
  8. 12. entry-level certification that covers foundational skills and knowledge in network security, compliance, operational security, threats and vulnerabilities, data and host security, access control, and identity management
  9. 14. malware that attaches itself to clean files and propagate to other files and programs