Across
- 7. A security process requiring two forms of identification
- 8. Malware that locks data and demands payment for release
- 9. The process of converting data into a coded format
- 11. Fraudulent attempt to obtain sensitive information via email
- 12. A software update that fixes security vulnerabilities
- 14. A security risk originating from within the organization
- 17. A hidden method of bypassing normal authentication
- 19. Software that secretly gathers user information
- 21. A secret word or phrase used to gain access
- 22. Faking the identity of a trusted source
Down
- 1. Unauthorized release of sensitive information
- 2. A malicious attempt to damage or disrupt systems
- 3. Tricking users into clicking something different than they think
- 4. Software designed to disrupt, damage, or gain unauthorized access
- 5. Installing the latest version of software for security and performance
- 6. A network of infected devices controlled remotely
- 10. A secure connection over the internet, often used remotely
- 13. A network security system that monitors and controls traffic
- 15. A type of malware disguised as legitimate software
- 16. Verifying the identity of a user or device
- 18. A tool that records keystrokes to steal information
- 19. Free from danger or threat
- 20. A vulnerability that is exploited before it’s known to the vendor
