Across
- 5. A person who uses technical skills and technology to gain unauthorized access to systems, networks, or data to commit crimes.
- 8. A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones
- 9. The act of applying effective technical and practical security measures to meet the regulatory or contractual requirements of a third party.
- 10. URLS that lead the user to download a virus or visit a harmful website
- 13. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
- 14. The probability of exposure or loss that can result from a cyberattack or data breach
- 16. A self-replicating program that spreads across a network
- 17. Malicious code that spreads through devices to damage them or steal the data within them.
Down
- 1. A type of phishing based on previously gathered information about a target that's publicly available or gained from a data breach.
- 2. . A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and computer equipment.
- 3. The possibility of an attack to gain unauthorized access to, damage, or steal information, intellectual property, or data.
- 4. A type of phishing attack that tricks C-suite employees into falling for some sort of emergency where they click a link or attachment that installs malware or steals sensitive information
- 6. Malicious code intended to monitor your activity without your permission.
- 7. preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.
- 10. Settings on folders or files that control who is allowed to access them.
- 11. Unauthorized entry to gain access to computer data, applications, networks, or devices.
- 12. A security approach based on the concept that all users both inside and outside an organization's network must have security authentication, authorization, and validation before gaining access to applications or data
- 15. An attack intended to make a machine or network inaccessible to its authorized users
