Cybersecurity terms

123456789101112131415
Across
  1. 3. the process of converting plaintext data into a coded format to prevent unauthorized access
  2. 6. a type of malicious software that automatically downloads advertisements on a device
  3. 7. process of converting data into a fixed-size string of characters for unique identificaton
  4. 12. a type of malicious software that disguises itself as legitimate or useful software
  5. 13. the process of monitoring network or system activities for malicious activities
  6. 15. technique that isolates applications or processes in a controlled environment
Down
  1. 1. a type of malicious software or hardware that records keystrokes made by a user
  2. 2. a security approach that allows only pre-approved users to access a network
  3. 4. an incident of unauthorized access to sensitive, protected or confidential data
  4. 5. the practice of securing information by transforming it into an unreadable format
  5. 8. a network of compromised computers that are controlled remotely by a hacker to perform automated tasks
  6. 9. a malicious software designed to gain unauthorized access to a network while hiding its presence
  7. 10. a software update designed to fix vulnerabilities, bugs, or improve functionality
  8. 11. any device that connects to a network and serves as a point of entry for data
  9. 14. a simulated cyber attack on a system conducted to identify and vulnerabilities