Across
- 2. An update to an operating system, application, or other software issued specifically to correct problems with the software.
- 5. A social engineering attack that uses phone calls to impersonate.
- 6. A type of scam where attackers trick people into giving away sensitive information.
- 10. When an attacker floods your inbox with emails to overwhelm the system and bury legitimate messages.
- 11. Malicious software that is made to harm your computer. Types of malware are viruses, worms, spyware, and ransomware.
- 13. A security tool that helps block unwanted access to your computer or network.
- 14. Completely Automated Public Turing test to tell Computers and Humans Apart.
- 15. Attack where a user's stolen login information (like username and password) from one website is used to gain access to accounts on other websites.
- 16. Malicious software that can spread itself from one computer to another.
Down
- 1. A type of malicious software that encrypts your data, holding it for ransom until a payment is made.
- 3. Software that helps protect your computer or device from viruses, malware, and other harmful programs.
- 4. Unauthorized user who attempts to or gains access to an information system.
- 7. Virtual Private Network
- 8. A security flaw in software that hackers discover before the company knows about it.
- 9. Authentication method that uses more than one type of authentication such as a password or a fingerprint scan.
- 12. A way to protect information by turning it into a secret code that only authorized people can read
