Across
- 2. Software designed to harm or exploit any device or network it infects.
- 4. A type of malware that encrypts a victim's files and demands payment in exchange for the decryption key.
- 7. Software designed to detect and remove viruses and other types of malware.
- 9. detection system Software that monitors a network or system for signs of unauthorized access or activity.
- 10. attack An attack that attempts to make a website or network unavailable to users by overwhelming it with traffic or requests.
- 12. authentication A security measure that requires two forms of identification to access an account.
- 13. breach The unauthorized access, use, or disclosure of sensitive information.
- 14. engineering The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
- 16. force attack A method of guessing a password by trying every possible combination until the correct one is found.
- 17. security The practice of securing a network from unauthorized access or attacks.
- 18. An update to software that fixes a vulnerability or bug.
- 19. Criminal activity that involves the use of digital devices or networks.
- 20. testing The process of testing a system or network for vulnerabilities by attempting to exploit them.
Down
- 1. exploit An attack that exploits a previously unknown vulnerability in a software application or system.
- 3. The process of verifying the identity of a user or system.
- 5. A type of social engineering attack that involves sending fraudulent emails or messages to trick people into sharing sensitive information.
- 6. Method of converting plain text into a code that can only be read by authorized parties.
- 8. A weakness or flaw in a system that can be exploited by attackers.
- 11. Network security system that monitors and controls incoming and outgoing network traffic.
- 15. The practice of protecting computer systems and networks from digital attacks, theft, and damage.