Across
- 2. An important process that verifies a user is really who they are; many different ways this can be done
- 4. I am not a robot
- 5. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
- 6. a collection of malware infested computers that form a network to attack
- 8. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- 9. Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
Down
- 1. Full name of DoS attack
- 2. An annoying malware that spams you with ads
- 3. When raw data is put into context and has meaning, the data transforms into _____
- 7. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.