Across
- 3. The measurement and analysis of physical characteristics, such as fingerprints or facial recognition, used to verify a person's identity.
- 5. A type of software that displays unwanted advertisements on a user's screen, often in the form of pop-ups, and may track browsing activities.
- 8. A malicious software program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- 10. A fraudulent attempt to obtain sensitive information by posing as a trustworthy entity, usually through email or other forms of communication.
- 12. A standalone malware program that replicates itself to spread to other computers, often causing harm to networks by consuming bandwidth.
- 13. A trial-and-error method used to decode encrypted data, such as passwords, by systematically checking all possible combinations.
- 16. An additional layer of security requiring users to provide two forms of identification to verify their identity, usually a password and a code sent to their device.
- 18. An attack designed to overwhelm a system or network by flooding it with traffic, rendering it unable to provide services to legitimate users.
- 19. The act of gaining unauthorized access to computers, networks, or data, often to exploit vulnerabilities for malicious purposes.
- 20. A cyberattack where users are redirected from a legitimate website to a fraudulent one without their knowledge, often used to steal login credentials.
- 21. A type of malware that encrypts a user's files or locks their system, demanding payment (ransom) to restore access.
- 23. A DoS attack launched from multiple sources simultaneously, making it harder to stop and causing greater disruption to the target system or network.
Down
- 1. A server that acts as an intermediary between a user's device and the internet, used to hide the user's IP address or bypass network restrictions.
- 2. A service that encrypts a user's internet connection and masks their IP address, providing privacy and security when using public networks.
- 4. A manipulation technique used to trick individuals into giving up confidential information, often through psychological manipulation rather than technical exploits.
- 6. A type of malware disguised as legitimate software, used to access systems by tricking users into loading and executing the malware on their systems.
- 7. A cryptographic protocol designed to provide secure communication over a computer network, often viewed as the successor to SSL.
- 9. Software that secretly collects information about a user's activities without their knowledge, often for advertising or theft purposes.
- 11. A protocol for establishing authenticated and encrypted links between networked computers, often used to secure communication over the internet.
- 14. A secret combination of characters used to verify a user's identity and grant access to a computer system or network.
- 15. The act of capturing data as it is transmitted over a network, often used by attackers to steal sensitive information.
- 17. A network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules, acting as a barrier between trusted and untrusted networks.
- 22. A unique identifier assigned to an individual for accessing a computer system, often used in conjunction with a password.
