Chapter 6-8

1234567891011121314151617181920212223242526272829
Across
  1. 2. software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
  2. 6. a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
  3. 13. a phishing attack aimed at a high-value individual like a CEO
  4. 14. notification sent by an authentication server to a mobile device associated with a user
  5. 15. control which users, groups, or services can perform an action on a file
  6. 17. software that provides protection against computer viruses and many other forms of malware
  7. 18. measurements of the unique characteristics of an individual
  8. 19. extra information that describes data, like location information or author information
  9. 23. the process of adding geographical identification to a device
  10. 24. a type of malware disguised as legitimate software such as a game or a utility application
  11. 25. is the act of a user claiming an identity
  12. 26. an authentication method that uses only one authentication factor to verify a claimed identity
  13. 27. intelligence derived from publicly available information on an individual or organization
  14. 28. a case of unauthorized computer access
Down
  1. 1. a protected environment where suspicious files can be run
  2. 3. A standardized set of rules for formatting and processing data
  3. 4. security principle that ensures information is only disclosed or made available to authorized users
  4. 5. the act of verifying or proving a user's claim to an identity
  5. 7. aspect of a computer that can be used to breach security
  6. 8. the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
  7. 9. special codes used to decode data
  8. 10. the act of granting a user access to a system resource
  9. 11. security principle that ensures information is accessible by authorized users whenever required
  10. 12. emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
  11. 16. security principle that ensures information is only modified in an authorized manner
  12. 17. a threat actor who gains unauthorized access to a high-value target for an extended period of time
  13. 20. a physical device assigned to a user that can generate a unique code
  14. 21. achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
  15. 22. any software developed to compromise the confidentiality, integrity, or availability of data
  16. 29. the most common form of a breach