Cyber Ready

1234567891011121314151617
Across
  1. 5. A person who uses technical skills and technology to gain unauthorized access to systems, networks, or data to commit crimes.
  2. 8. A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones
  3. 9. The act of applying effective technical and practical security measures to meet the regulatory or contractual requirements of a third party.
  4. 10. URLS that lead the user to download a virus or visit a harmful website
  5. 13. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
  6. 14. The probability of exposure or loss that can result from a cyberattack or data breach
  7. 16. A self-replicating program that spreads across a network
  8. 17. Malicious code that spreads through devices to damage them or steal the data within them.
Down
  1. 1. A type of phishing based on previously gathered information about a target that's publicly available or gained from a data breach.
  2. 2. . A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and computer equipment.
  3. 3. The possibility of an attack to gain unauthorized access to, damage, or steal information, intellectual property, or data.
  4. 4. A type of phishing attack that tricks C-suite employees into falling for some sort of emergency where they click a link or attachment that installs malware or steals sensitive information
  5. 6. Malicious code intended to monitor your activity without your permission.
  6. 7. preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.
  7. 10. Settings on folders or files that control who is allowed to access them.
  8. 11. Unauthorized entry to gain access to computer data, applications, networks, or devices.
  9. 12. A security approach based on the concept that all users both inside and outside an organization's network must have security authentication, authorization, and validation before gaining access to applications or data
  10. 15. An attack intended to make a machine or network inaccessible to its authorized users