cyber-security-560

123456789101112131415161718
Across
  1. 2. Method of gaining access to accounts by systematically trying all possible password combinations.
  2. 4. Update to software that fixes vulnerabilities or bugs to improve security and performance.
  3. 6. Security process requiring two different forms of identification for access. (sigla)
  4. 7. Vulnerability in software that is exploited before the developer has a chance to fix it.
  5. 10. Provides secure, encrypted connections over less secure networks.
  6. 12. Software designed to detect and remove malware from computers.
  7. 13. Software that secretly monitors and collects information about users without their knowledge.
  8. 14. System that monitors network traffic for suspicious activities or policy violations.
  9. 15. General term for any software designed to harm, exploit, or otherwise compromise devices and networks.
  10. 18. Software or hardware that records every keystroke made on a computer.
Down
  1. 1. Attack that overloads a system, making it unavailable to legitimate users.
  2. 3. The process of converting data into a coded form to prevent unauthorized access.
  3. 5. Hidden way to bypass normal authentication to gain unauthorized access to a system.
  4. 8. Type of malware that encrypts data and demands a ransom for its release.
  5. 9. Software or hardware that monitors and controls incoming and outgoing network traffic.
  6. 11. Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  7. 16. Network of infected computers that can be remotely controlled by a cybercriminal.
  8. 17. Malware disguised as legitimate software but allows unauthorized access to a user’s system.