CIS120

1234567891011121314151617181920
Across
  1. 1. A software update intended to fix vulnerabilities or improve security within a computer program.
  2. 3. The protection of endpoints (devices such as computers, smartphones, and tablets) from various cyber threats.
  3. 5. The use of unique biological traits, such as fingerprints or facial recognition, to verify a user's identity.
  4. 7. A technology service that creates a secure and encrypted internet connection.
  5. 8. A security system that monitors and controls incoming and outgoing network traffic.
  6. 14. The process of managing and mitigating the impact of a cybersecurity incident, including investigating and responding to security breaches.
  7. 16. An attack that takes advantage of a security vulnerability on the same day it becomes publicly known.
  8. 17. A security process in which a user provides multiple identification factors to verify their identity.
  9. 18. A piece of software designed to update or fix problems with a computer program.
  10. 19. Unauthorized interception of network traffic to capture and analyze data, often used for malicious purposes.
  11. 20. A fraudulent attempt to obtain sensitive information, by disguising as a trustworthy entity.
Down
  1. 2. The practice and study of techniques for securing communication and data through the use of codes and ciphers.
  2. 4. Ethical hackers who use their skills to identify and fix security vulnerabilities rather than exploiting them for malicious purposes.
  3. 6. A security mechanism that monitors network activities for signs of malicious behavior.
  4. 9. A simulated cyberattack on a computer system or network to assess its vulnerabilities and weaknesses.
  5. 10. Malicious software designed to harm or exploit computer systems.
  6. 11. A network of compromised computers (bots) controlled by a single entity, often used for malicious activities such as spam or DDoS attacks.
  7. 12. The use of psychological manipulation to trick individuals into divulging confidential information.
  8. 13. An attempt to make a computer or network resource unavailable to its intended users by overwhelming it with a flood of illegitimate requests.
  9. 15. The process of converting information into a code to prevent unauthorized access.