Cybersecurity Terms

12345678910111213141516171819202122232425
Across
  1. 2. an identity and access management security method that requires two forms of identification to access resources and data
  2. 4. an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet
  3. 7. a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages
  4. 8. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
  5. 11. software and operating system (OS) updates that address security vulnerabilities within a program or product
  6. 13. the act of disguising a communication from an unknown source as being from a known, trusted source
  7. 14. the process of converting information or data into a code, especially to prevent unauthorized access
  8. 15. a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network
  9. 16. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
  10. 17. the collection of secure information and communication techniques employing mathematical concepts and algorithms used to disguise the content of messages
  11. 18. a typically covert method of bypassing normal authentication or encryption in a computer
  12. 20. any piece of software or application that displays advertisements, usually through pop-up or pop-under windows
  13. 24. an ethical hacker whose job involves hacking into computer systems to detect security risks
  14. 25. a type of malware program that enables cyber criminals to gain access to and infiltrate data from machines without being detected
Down
  1. 1. the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
  2. 3. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  3. 5. a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware
  4. 6. a program designed to breach the security of a computer system while ostensibly performing some innocuous function
  5. 9. a type of malicious software designed to block access to a computer system until a sum of money is paid
  6. 10. a form of malware or hardware that keeps track of and records your keystrokes as you type
  7. 12. a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
  8. 19. verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  9. 21. a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself
  10. 22. an attack in which an attacker is positioned between two communicating parties in order to intercept and/or alter data traveling between them
  11. 23. a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system