Cybersecurity Crossword

123456789101112
Across
  1. 3. a method that used to find out a password by monitoring traffic on a network to pull out information.
  2. 4. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
  3. 5. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage while asking for payment.
  4. 6. An attack on targeted individuals to obtain sensitive, personal, and confidential data via email or fraudulent websites.
  5. 7. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  6. 8. This allows users to connect the organization's protected network using multi-factor authentication.
  7. 11. An individual or group posing a threat.
  8. 12. A computer under the control of a remote attacker which has been infected with software or scripts to perform tasks on command.
Down
  1. 1. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  2. 2. A technique used to manipulate and deceive people to gain sensitive and private information. These scams are built around how people think and act.
  3. 9. The process of changing plaintext into ciphertext using a cryptographic algorithm and key.
  4. 10. An audio or video clip that has been edited and manipulated to seem real or believable.