Across
- 2. A form of malware that encrypts a user’s data and demands payment to unlock it.
- 4. Malware that gathers information about a person or organization without their knowledge.
- 6. Malware that gathers information about a person or organization without their knowledge.
- 10. A network security device or software that monitors and controls incoming and outgoing traffic.
- 12. A simulated cyberattack to evaluate the security of a system.
- 15. An extra layer of security requiring two forms of identification for access.
Down
- 1. The psychological manipulation of people to disclose confidential information.
- 3. Software intentionally designed to cause damage, such as viruses, worms, and Trojans.
- 5. The process of converting information into a code to prevent unauthorized access.
- 7. A type of social engineering attack where attackers trick users into revealing personal information.
- 8. A trial-and-error method used to guess passwords or encryption keys.
- 9. An attack where multiple systems flood a target, causing denial of service.
- 11. A tool that encrypts internet traffic and hides a user’s IP address.
- 13. A flaw in software that is unknown to the vendor and, therefore, unpatched.
- 14. A network of infected devices controlled remotely by a hacker, typically to launch large-scale attacks.