Cybersecurity

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 3. Individually identifiable health information in the form of electronic data, paper records, or even spoken conversation.
  2. 7. Cookie that exists only as long as the web browser is open.
  3. 9. All points or areas in a system that could be used or compromised to allow hackers entry into the system.
  4. 10. The actions of malicious code
  5. 11. Flaw that exists in software when it was released and remains unknown until it is exploited by hackers.
  6. 13. Changes to a system are tracked by which user account made them.
  7. 14. Having multiple levels of protection.
  8. 16. Digging through trash for useful information.
  9. 18. Ransomware automatically downloaded when a user visits a web page that is infected.
  10. 19. A macro that has been programmed to carry out a malicious intent.
  11. 21. Cookie that originates from a visit to a website, but references a different website.
  12. 23. Malware that changes its characteristics in attempts to avoid detection from antivirus programs.
  13. 24. Cookie that stays on the computer until an expiration date is met.
  14. 25. Software embedded on hardware devices to control the system.
  15. 26. Malware hidden inside other software that appears to be harmless.
  16. 27. Help break down the aspects of a business and security domains into manageable task areas and tasks to organize protection against cybersecurity threats.
  17. 29. A virus that infects a computer before the operating system loads.
  18. 31. Malware that allows the hacker to use an embedded backdoor to gain administrative control of the victim's computer.
  19. 32. Computer code intentionally written to cause some form of harm;
  20. 33. Using social tools and technk1ues to obtain information.
  21. 35. The three underlying principles of data protection: confidentiality, integrity, and availability.
  22. 37. Set of regulations from credit card vendors that apply to businesses using their services; an industry standard, not a law.
  23. 39. The state of data being I complete or uncorrupted; also the honesty of a person's actions.
  24. 40. A flaw or potential for harm.
  25. 41. Law ensuring financial businesses protect consumer’s private data.
  26. 43. Following the rules or standards that have been established.
  27. 44. Law dealing with unauthorized access of computers.
  28. 45. methodology An approach to finding previously undetected unwanted programs or variants of known viruses through a learning approach.
  29. 46. Malware designed to prevent security analysts from reading the source code by attempting to prevent access to or disassembly of the code itself.
  30. 47. Law protecting wire and electronic transmissions of data.
Down
  1. 1. Cookie that can only be sent using an encrypted session.
  2. 2. Information about a person left behind by hi~ or her actions on the Internet.
  3. 4. Law protecting electronic medical records and personal health information.
  4. 5. Something that takes a vulnerability to a level where the flaws can be exploited
  5. 6. Technology that tracks a 4ser's keystrokes on the keyboard.
  6. 8. Computing technology incorporated into nontypical devices to allow communication with other devices and the Internet.
  7. 12. Statement of if the site uses cookies and, if so, how.
  8. 15. Malware that deploys its payload when a date or time occurs.
  9. 17. Digital or electronic platform for health records.
  10. 20. Malware deployed when conditions exist that the malware is seeking.
  11. 22. The condition of being private or secret.
  12. 28. Using a lie or scam to obtain private information.
  13. 30. Software installed on a computer that collects data on the user and then redirects advertising sites to the web browser.
  14. 34. Malware that encrypts the user's data; also called ransomware.
  15. 36. A secret or unknown access point of entry into a system.
  16. 38. Law preventing company executives from hiding or destroying electronic records
  17. 42. Encrypts data, rather than stealing or destroying, to prevent user access unless a fee is paid to the hacker;