Across
- 2. A means of isolating applications, code or entire operating systems in order to perform testing or evaluation
- 6. A security mechanism prohibiting the execution of any program that is not on a pre-approved list of software
- 8. The recovery of data following computer failure or loss
- 9. Another kind of malware that allows cybercriminals to remotely control your computer
- 13. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element
- 16. Malware that passes information about a computer user’s activities to an external party
- 18. Obtaining services by using someone else’s resources
- 19. A device or software designed to prevent unauthorized access to a computer or network
- 22. A term related to the malicious concept of a botnet
- 23. A malicious application or script that can be used to take advantage of a computer’s vulnerability
- 24. Any means by which the keystrokes of a victim are recorded as they are typed into the physical keyboard
- 26. high-speed internet access
Down
- 1. A flaw or weakness that can be used to attack a system or organization
- 3. Computer that provides data or services to other computers over a network
- 4. An app on your phone that generates a code to add an extra level of security to a password
- 5. The proper term to refer to an unauthorized attacker of computers, networks, and technology instead of the misused term “hacker”
- 7. A person who has knowledge and skill in analyzing program code or a computer system, modifying its functions or operations and altering its abilities and capabilities
- 10. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage
- 11. Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effect
- 12. Method used by criminals to obtain financial or other confidential information
- 14. It's not really a _____, it's just someone else's computer
- 15. This should be at least 8 characters long
- 17. The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation
- 20. Something of value to a person, business, or organization
- 21. Something that could cause an organization not to meet one of its objectives
- 25. Malware that replicates itself so it can spread to infiltrate other computers
