Across
- 1. Secret or unknown access point into a system
- 3. Computing embedded into everyday objects and environments
- 7. Malware hidden inside other software that appears to be harmless
- 10. Computer code intentionally written to cause some form of harm
- 11. Changes its characteristics in attempts to avoid detection from antivirus programs
- 12. When a malicious actor gets possession of a user's active Session ID and impersonates the user in a connection to the website
- 17. Technology that tracks a user's keystrokes on the keyboard
- 18. Actions of the malicious code
- 19. Internet of Things; revolves around incorporating computing technology into atypical devices to allow communication with other devices and the Internet
- 20. Form of malware that allows the hacker to use an embedded backdoor to gain administrative control of the victim's computer
Down
- 2. Malware that encrypts the user's data
- 4. Flaw or potential for harm
- 5. Small text files saved on the computer for web browsers and websites
- 6. Unique code assigned to the user's connection for a period of time to keep track of the website state and associate that state with a user
- 8. Does not steal or destroy data, encrypts data so user cannot access it until a fee is paid to the hacker
- 9. Mobile Device Management; used to enforce encryption, strong authentication, and monitor device activity centrally
- 13. Something that takes a vulnerability to a level where it can be exploited
- 14. Bring Your Own Device; policies allow employees and students to use personal devices on organizational networks
- 15. Virus that infects a computer before the operating system loads
- 16. Software installed on a computer that collects data on the user and then redirects advertising sites to the web browser
