Across
- 3. type of social engineering attack that appears as a trustworthy entity in digital communication but steals user data, such as login credentials and financial information
- 5. software that enables attackers to have access to a system masquerading as operating system processes
- 8. device that forwards data packets to the appropriate parts of a computer network
- 9. tool or technology often used maliciously to capture keystrokes on a computer to obtain sensitive information such as passwords
- 13. fundamental rule or procedure that governs communication between devices in a network
- 15. process of transforming legible data into a coded format, making it unreadable to unauthorized entities
- 16. program that conceals itself as a safe program but often carries many other different types of malicious payloads
- 17. malicious software designed to damage, exploit, infect systems, or otherwise compromise data, devices, users, or networks, using viruses, worms, and spyware that is installed into the basic input-output system (BIOS) of a computer
- 18. network security system that uses security rules to monitor and control incoming and outgoing traffic
- 19. practice of protecting systems, networks, devices, and data from online threats
- 20. process of converting data into a fixed-size string of characters, typically used for security purposes to ensure data integrity
Down
- 1. device that connects and segments various components within a local network
- 2. logically visible subdivision of an IP network, increasing its efficiency and security
- 4. powerful computer or computer program that provides data to other computers (clients) over a network
- 6. stand-alone software program that spreads without requiring a host program
- 7. process of verifying the identity of a user or device, often through credentials such as passwords or digital certificates
- 10. type of malicious software that encrypts users’ files such as photos, documents, or other sensitive information and demands a ransom for their release
- 11. social engineering attack that involves creating a fabricated scenario to obtain private data
- 12. entry-level certification that covers foundational skills and knowledge in network security, compliance, operational security, threats and vulnerabilities, data and host security, access control, and identity management
- 14. malware that attaches itself to clean files and propagate to other files and programs
