Across
- 2. an identity and access management security method that requires two forms of identification to access resources and data
- 4. an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet
- 7. a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages
- 8. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
- 11. software and operating system (OS) updates that address security vulnerabilities within a program or product
- 13. the act of disguising a communication from an unknown source as being from a known, trusted source
- 14. the process of converting information or data into a code, especially to prevent unauthorized access
- 15. a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network
- 16. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
- 17. the collection of secure information and communication techniques employing mathematical concepts and algorithms used to disguise the content of messages
- 18. a typically covert method of bypassing normal authentication or encryption in a computer
- 20. any piece of software or application that displays advertisements, usually through pop-up or pop-under windows
- 24. an ethical hacker whose job involves hacking into computer systems to detect security risks
- 25. a type of malware program that enables cyber criminals to gain access to and infiltrate data from machines without being detected
Down
- 1. the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
- 3. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- 5. a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware
- 6. a program designed to breach the security of a computer system while ostensibly performing some innocuous function
- 9. a type of malicious software designed to block access to a computer system until a sum of money is paid
- 10. a form of malware or hardware that keeps track of and records your keystrokes as you type
- 12. a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
- 19. verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- 21. a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself
- 22. an attack in which an attacker is positioned between two communicating parties in order to intercept and/or alter data traveling between them
- 23. a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system