Across
- 6. A security vulnerability that is unknown to the vendor and has not been patched.
- 7. Control Security techniques that regulate who or what can view or use resources in a computing environment.
- 8. Software designed to harm or exploit any programmable device or network.
- 11. A network security device that monitors and controls incoming and outgoing network traffic.
- 12. An attack that overwhelms a system with traffic from multiple sources, causing service disruption.
- 13. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- 16. The process of converting information into code to prevent unauthorized access.
- 17. A weakness in a system that can be exploited to compromise its security.
- 19. Any potential danger to information or systems.
Down
- 1. A type of spyware that records keystrokes to capture sensitive information.
- 2. The practice of collecting and analyzing digital evidence after a cybersecurity incident.
- 3. Software that secretly monitors user activity and collects information.
- 4. Engineering Manipulating people into divulging confidential information through deceptive means.
- 5. Breach An incident where unauthorized access to sensitive data occurs.
- 9. The process of verifying the identity of a user or device.
- 10. A type of malware that locks or encrypts a user's files, demanding a ransom for access.
- 13. A software update designed to fix vulnerabilities or bugs.
- 14. An event that has an adverse effect on the security of an information system.
- 15. A protocol for establishing a secure connection between a web server and a browser.
- 18. A network of infected devices controlled by a hacker to perform automated tasks.