Across
- 3. A type of cyberattack in which an attacker systematically attempts all possible combinations of passwords or encryption keys to gain unauthorized access.
- 5. A network security device or software that monitors and controls incoming and outgoing network traffic to protect against unauthorized access and cyber threats.
- 6. Malicious software designed to harm or gain unauthorized access to computer systems, including viruses, Trojans, and ransomware.
- 8. A form of cyberattack in which attackers impersonate trusted entities to trick individuals into disclosing sensitive information or taking malicious actions.
- 9. The world's greatest Flamingo
- 12. Unauthorized interception and monitoring of network communications, typically for the purpose of gathering sensitive information.
- 14. The potential for financial loss, reputation damage, or other adverse consequences resulting from cybersecurity threats,
- 15. A decoy system or network intentionally set up to attract and deceive cyber attackers, allowing security professionals to observe and study their activities.
- 18. A vulnerability or software flaw that is unknown to the software vendor and therefore has no available fix or patch, making it highly exploitable.
- 20. A part of the internet that is intentionally hidden and only accessible using special software, where users can browse anonymously and engage in activities that often include illegal or illicit transactions.
- 22. A software update or fix released by vendors to address security vulnerabilities and improve the functionality or stability of a program or system.
- 23. Social ___ is when individuals manipulate or deceive others, often using psychological tactics, to gain unauthorized access to information, systems, or physical spaces or to influence their actions for malicious purposes.
- 24. is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS phishing
Down
- 1. Contact the ___ ___ if you suspect malicious activity on your computer.
- 2. The process of converting data into a secure, unreadable format to protect it from unauthorized access or interception.
- 4. Malicious software that can replicate itself and infect other computer files, often causing harm by altering, corrupting, or deleting data and compromising the affected computer's operation.
- 7. Malicious software that encrypts a victim's files or system and demands a ransom payment in exchange for the decryption key.
- 9. Report Suspicious emails with the ___ ___ ___
- 10. A secret combination of characters, typically known only to the authorized user
- 11. A secure network connection that encrypts data traffic between a user's device and a remote server, providing privacy and anonymity, especially on public networks.
- 13. A cyber crime that uses the phone to steal personal confidential information
- 16. A network of interconnected physical devices, such as smart appliances and sensors, that can collect and exchange data over the internet.
- 17. A malicious cyber tactic that attempts to distribute malware through online advertisements.
- 19. Practicing cyber ___ is when you consistently follow best practices and take proactive measures to protect your digital devices, personal information, and online activities from cybersecurity threats and vulnerabilities.
- 21. Software designed to detect, prevent, and remove computer viruses and other malware from a computer or network.
- 24. Email ___ makes it seem that an email is coming from a legitimate or trusted source when, in reality, it may be sent by malicious actors with malicious intent.