Across
- 1. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- 5. A digital form of social engineering to deceive individuals into providing sensitive information.
- 9. A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
- 11. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
- 13. Facebook, Twitter, Instagram, etc. (Two words)
- 14. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
- 15. Software that compromises the operation of a system by performing an unauthorized function or process.
Down
- 2. Widely used in-home network technololy that allows for wireless connection.
- 3. A security tool that creates a secure, encrypted connection between you and the internet
- 4. A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.
- 6. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
- 7. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
- 8. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
- 10. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
- 12. An unauthorized user who attempts to or gains access to an information system.
