Across
- 4. = files that appear to be legitimate programs, but really contain malicious code.
- 6. = a broader, often scheduled release of software that includes, but is not limited to, patches.
- 8. = specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access Vulnerability = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).Vulnerability = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
- 12. = the process of converting readable data (plaintext) into an unreadable, scrambled format (ciphertext) using cryptographic algorithms.
- 15. = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
- 18. = refers to the extent to which individuals understand that there are potential threats to the information systems they use and the measures they should take to mitigate those threats.
- 19. = a collection of internet connected devices such as computers, smartphones, or IoT devices infected with malware and controlled remotely by a single attacker
Down
- 1. = proactive strategies, policies, and technologies implemented to reduce the likelihood and impact of cyber threats on an organization's digital assets
- 2. = the process of securing a system by reducing its surface of vulnerability
- 3. = program that blocks access to files or block use of the device until a ransom is paid
- 5. = a network security system that acts as a barrier between a trusted internal network and untrusted external networks (like the Internet).
- 7. = any potential malicious act, event, or person aiming to illegally access, damage, disrupt, or steal data, networks, or digital devices
- 9. = a set of rules, regulations, and guidelines that dictate how an organization protects its data and IT infrastructure.
- 10. Day = an attack that takes advantage of code flaws that have VERY recently been discovered.
- 11. = The use of bogus emails and websites to trick you into confidential information
- 13. = is a programmatic approach to educating staff on information security risks, including e-learning, newsletters, and simulations (e.g., phishing campaigns) to change behavior and reduce human error.
- 14. = a set of changes (code updates) to a computer program or its supporting data designed to update, fix, or improve it.
- 16. Control = a security method that regulates who or what can view or use resources in a computing environment.
- 17. = any code or application designed to damage, disrupt, or steal data from computer systems
