Cyber security

1234567891011121314151617181920212223
Across
  1. 3. The measurement and analysis of physical characteristics, such as fingerprints or facial recognition, used to verify a person's identity.
  2. 5. A type of software that displays unwanted advertisements on a user's screen, often in the form of pop-ups, and may track browsing activities.
  3. 8. A malicious software program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  4. 10. A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity, usually through email or other forms of communication.
  5. 12. A standalone malware program that replicates itself to spread to other computers, often causing harm to networks by consuming bandwidth.
  6. 13. A trial-and-error method used to decode encrypted data, such as passwords, by systematically checking all possible combinations.
  7. 16. An additional layer of security requiring users to provide two forms of identification to verify their identity, usually a password and a code sent to their device.
  8. 18. An attack designed to overwhelm a system or network by flooding it with traffic, rendering it unable to provide services to legitimate users.
  9. 19. The act of gaining unauthorized access to computers, networks, or data, often to exploit vulnerabilities for malicious purposes.
  10. 20. A cyberattack where users are redirected from a legitimate website to a fraudulent one without their knowledge, often used to steal login credentials.
  11. 21. A type of malware that encrypts a user's files or locks their system, demanding payment (ransom) to restore access.
  12. 23. A DoS attack launched from multiple sources simultaneously, making it harder to stop and causing greater disruption to the target system or network.
Down
  1. 1. A server that acts as an intermediary between a user's device and the internet, used to hide the user's IP address or bypass network restrictions.
  2. 2. A service that encrypts a user's internet connection and masks their IP address, providing privacy and security when using public networks.
  3. 4. A manipulation technique used to trick individuals into giving up confidential information, often through psychological manipulation rather than technical exploits.
  4. 6. A type of malware disguised as legitimate software, used to access systems by tricking users into loading and executing the malware on their systems.
  5. 7. A cryptographic protocol designed to provide secure communication over a computer network, often viewed as the successor to SSL.
  6. 9. Software that secretly collects information about a user's activities without their knowledge, often for advertising or theft purposes.
  7. 11. A protocol for establishing authenticated and encrypted links between networked computers, often used to secure communication over the internet.
  8. 14. A secret combination of characters used to verify a user's identity and grant access to a computer system or network.
  9. 15. The act of capturing data as it is transmitted over a network, often used by attackers to steal sensitive information.
  10. 17. A network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
  11. 22. A unique identifier assigned to an individual for accessing a computer system, often used in conjunction with a password.