Across
- 4. An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
- 5. A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
- 7. The process of converting information or data into a code to further prevent unauthorized access.
- 8. Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- 10. A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
- 1. Unauthorized access to computer data, applications, networks, or devices.
- 2. _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
- 3. Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
- 6. Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
- 9. Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.