Across
- 4. measures that reduce the likelihood of an unwanted occurrence or lessen its consequences
- 6. software that compromises the operation of a system by performing an unauthorized function or process
- 8. a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and spread further
- 9. an attack method that uses trial and error to crack passwords
- 11. abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages
- 13. a type of malware that conceals its true content to fool a user into thinking it's a harmless file
- 15. the fraudulent practice of sending test messages purporting to be form reputable companies in order to convince individuals to reveal personal information
Down
- 1. the ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption
- 2. a digital form of social engineering to deceive individuals into providing sensitive information or exposing their system to malware
- 3. limits network traffic between networks or systems
- 5. an unauthorized user who attempts to or gains access to an information system
- 7. the process of verifying one's identity
- 10. a technology that allows a program to interact with the internals of another program running on a different machine
- 12. An attempt to gain unauthorized access to system services, resources, or information
- 14. a string of characters used to authenticate an identity or to verify authorizes access