Across
- 3. the act of granting a user access to a system resource
- 5. extra information that describes data, like location information or author information
- 6. measurements of the unique characteristics of an individual
- 8. a phishing attack aimed at a high-value individual like a CEO
- 10. is the act of a user claiming an identity
- 11. the most common form of a breach
- 15. the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
- 18. a physical device assigned to a user that can generate a unique code
- 20. a threat actor who gains unauthorized access to a high-value target for an extended period of time
- 22. emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
- 23. the act of verifying or proving a user's claim to an identity
- 24. a type of malware disguised as legitimate software such as a game or a utility application
- 25. security principle that ensures information is only modified in an authorized manner
- 27. software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
- 29. software that provides protection against computer viruses and many other forms of malware
Down
- 1. aspect of a computer that can be used to breach security
- 2. a case of unauthorized computer access
- 4. achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
- 7. security principle that ensures information is only disclosed or made available to authorized users
- 9. security principle that ensures information is accessible by authorized users whenever required
- 12. the process of adding geographical identification to a device
- 13. any software developed to compromise the confidentiality, integrity, or availability of data
- 14. A standardized set of rules for formatting and processing data
- 16. a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
- 17. notification sent by an authentication server to a mobile device associated with a user
- 19. a protected environment where suspicious files can be run
- 21. intelligence derived from publicly available information on an individual or organization
- 22. control which users, groups, or services can perform an action on a file
- 26. special codes used to decode data
- 28. an authentication method that uses only one authentication factor to verify a claimed identity
