Crossword

12345678910111213141516171819
Across
  1. 4. Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
  2. 7. The process of extracting information and data from computers while preserving its integrity and maintaining a strict chain of custody.
  3. 11. The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  4. 12. A method of trying to gather personal information using deceptive e-mails and websites.
  5. 13. A simulated cyber attack against your computer system to check for exploitable vulnerabilities.
  6. 15. A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
  7. 16. A device or software application that monitors a network or systems for malicious activity or policy violations.
  8. 17. A cyber attack that occurs on the same day a vulnerability is discovered in software.
  9. 18. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  10. 19. A service that encrypts your internet traffic and protects your online identity.
Down
  1. 1. Malicious software designed to harm, exploit, or otherwise compromise a computer system.
  2. 2. An extra layer of security used to ensure that people trying to gain access to an online account are who they say they are.
  3. 3. A trial-and-error method used to decode encrypted data such as passwords.
  4. 5. An attack that aims to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
  5. 6. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  6. 8. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  7. 9. A code injection technique that might destroy your database.
  8. 10. The process of converting information or data into a code, especially to prevent unauthorized access.
  9. 12. management The process of managing a network of computers by regularly performing system updates and deploying software patches to fix vulnerabilities.
  10. 14. A type of malware that threatens to publish the victim's data or block access to it unless a ransom is paid.