Across
- 4. Personally Identifiable Information
- 5. ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
- 9. Type of malware that threatens to expose information unless a payment is made
- 10. Health Insurance Portability and Accountability Act
- 11. An email that tricks you into giving up your passphrase
Down
- 1. A weakness in a program or system that can be exploited
- 2. Email ______ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity
- 3. CWRU classifies information as: public, internal-use, and _______
- 6. Install operating system security ________ regularly
- 7. The process of changing plain text to cipher text using an algorithm
- 8. A ______ and Control, or C2, server is used by an adversary to communicate with compromised systems