Cybersecurity

123456789101112131415161718192021222324252627282930
Across
  1. 5. process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm
  2. 8. when a programmer gains access to a computer or network by bypassing security steps through a trapdoor programs
  3. 11. a malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device
  4. 12. provides additional- revised or updated code for an operating system or application
  5. 15. software that is secretly installed on a user’s device to gather sensitive data
  6. 17. someone who intentionally challenges the security of a computer system- network- or web application to discover vulnerabilities that an attacker or hacker could exploit
  7. 18. information should be consistently and readily accessible for authorized parties
  8. 20. attack when one or more compromised systems launch a flooding attack on a remote target(s)- in an attempt to overload network resources and disrupt service.
  9. 22. a type of internet fraud that seeks to acquire a user’s credentials by deception- usually taking the form of fake notifications from banks- providers- e-pay systems- and other organizations.
  10. 23. taking advantage of a vulnerability or flaw in a network system to penetrate or attack it.
  11. 26. the operational lead for federal cybersecurity and the national coordinator for critical infrastructure security and resilience.
  12. 27. the name given to malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data
  13. 29. an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
  14. 30. maintaining the consistency- accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit- and steps must be taken to ensure data cannot be altered by unauthorized people
Down
  1. 1. assurance that information is not disclosed to unauthorized persons- processes- or devices.
  2. 2. an attack method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found.
  3. 3. criminals who break into computer networks with malicious intent.
  4. 4. an increasingly popular method of gaining access to unauthorized resources by exploiting human psychology and manipulating users – rather than by breaking in or using technical hacking techniques
  5. 6. a facility where enterprise information systems (websites- applications- databases- data centers and servers- networks- desktops- and other endpoints) are monitored- assessed- and defended by SOC analysts.
  6. 7. look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found- they report them to the owner- sometimes requesting a small fee to fix the problem
  7. 9. sometimes also called “ethical hackers” or “good hackers” – exploit computer systems or networks to identify their security flaws so they can make recommendations for improvement.
  8. 10. the practice and study of techniques for secure communication in the presence of adversarial behavior.
  9. 13. the process of verifying the identity of a user or piece of information and the veracity of the information provided. In computing- it is the process of identifying a person or system with a username- password- etc.
  10. 14. encrypted parts of the internet that are not indexed by search engines- most notoriously used by all types of criminals including; pedophiles- illicit human and contraband traffickers- and cyber criminals- to communicate and share information without being detected or identified by law enforcement.
  11. 16. a kind of spyware software that records every keystroke made on a computer’s keyboard
  12. 19. when a hacker successfully exploits a network or device vulnerability and gains access to its files and data.
  13. 21. a security system that forms a virtual perimeter around a network of workstations preventing viruses- worms- and hackers from penetrating.
  14. 24. a general term for any type of intrusive computer software with malicious intent against the user.
  15. 25. a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
  16. 28. a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.