Across
- 2. software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
- 6. a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
- 13. a phishing attack aimed at a high-value individual like a CEO
- 14. notification sent by an authentication server to a mobile device associated with a user
- 15. control which users, groups, or services can perform an action on a file
- 17. software that provides protection against computer viruses and many other forms of malware
- 18. measurements of the unique characteristics of an individual
- 19. extra information that describes data, like location information or author information
- 23. the process of adding geographical identification to a device
- 24. a type of malware disguised as legitimate software such as a game or a utility application
- 25. is the act of a user claiming an identity
- 26. an authentication method that uses only one authentication factor to verify a claimed identity
- 27. intelligence derived from publicly available information on an individual or organization
- 28. a case of unauthorized computer access
Down
- 1. a protected environment where suspicious files can be run
- 3. A standardized set of rules for formatting and processing data
- 4. security principle that ensures information is only disclosed or made available to authorized users
- 5. the act of verifying or proving a user's claim to an identity
- 7. aspect of a computer that can be used to breach security
- 8. the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
- 9. special codes used to decode data
- 10. the act of granting a user access to a system resource
- 11. security principle that ensures information is accessible by authorized users whenever required
- 12. emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
- 16. security principle that ensures information is only modified in an authorized manner
- 17. a threat actor who gains unauthorized access to a high-value target for an extended period of time
- 20. a physical device assigned to a user that can generate a unique code
- 21. achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
- 22. any software developed to compromise the confidentiality, integrity, or availability of data
- 29. the most common form of a breach
