Cybersecurity

12345678910
Across
  1. 4. ____ is an attempt by cybercriminals posing as legitimate institutions, usually via email, to obtain sensitive information from targeted individuals.
  2. 5. ____ computing uses 1 processor.
  3. 6. A ____ attack is spamming a web server with so many requests so close together that it crashes.
  4. 8. The digital ____is a gap between those who have access to new technology and those who do not.
  5. 9. ____ is any program code that explicitly attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions.
  6. 10. DNS ____ is when a hacker pretends to be a DNS server and feeds your computer the wrong IP Address for a given website, sending you to a false website.
Down
  1. 1. ____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password
  2. 2. A ___ is information stored on your computer by a website you visit. They often store your settings for a website, such as your login status and preferred language or location.
  3. 3. Multi-factor _____ is an authentication method that requires the user to provide two or more verification factors to gain access.
  4. 4. ____ computing uses multiple processors.
  5. 7. A type of spyware that records every keystroke (and sometimes also mouse movements) made by a computer user in order to gain access to passwords and other confidential info