Day 4 Cyber Security 2 Chapter 4

12345678910111213141516171819202122232425
Across
  1. 1. The unauthorized transfer of data from a computer system.
  2. 5. A weakness in a system that can be exploited by a threat.
  3. 7. A hardware device or software program that stops network traffic based on a set of rules.
  4. 10. A computer that is part of a botnet, controlled by an attacker.
  5. 11. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  6. 13. The practice of sending fraudulent emails that resemble emails from reputable sources to induce individuals to reveal personal information.
  7. 16. The process of verifying the identity of a user.
  8. 17. A unique identifier for a device on a network (abbreviation).
  9. 18. A set of rules governing the exchange or transmission of data between devices.
  10. 21. A secret word or phrase that must be used to gain admission to something.
  11. 23. A program that appears to do one thing but actually does another, often malicious, thing. (2 words)
  12. 24. Software that is intended to damage or disable computers and computer systems.
  13. 25. A system that detects and prevents malicious activities on a network (abbreviation).
Down
  1. 2. The 'A' in the CIA Triad, ensuring that systems and data are available to authorized users when needed.
  2. 3. The act of deceiving someone into revealing sensitive information. (2 words)
  3. 4. The process of making data unreadable to unauthorized users.
  4. 5. The process of granting or denying approval to use specific resources.
  5. 6. A type of attack that overwhelms a system with traffic, making it unavailable to users (abbreviation).
  6. 8. A network security device that monitors and filters incoming and outgoing network traffic.
  7. 9. A person who uses computers to gain unauthorized access to data.
  8. 12. A type of malware that holds a victim's data for ransom.
  9. 14. A program designed to breach the security of a computer system while ostensibly performing some innocuous function.
  10. 15. Any circumstance or event with the potential to adversely impact organizational operations.
  11. 18. Unsolicited bulk messages, especially advertising.
  12. 19. A small piece of data sent from a website and stored on the user's computer by the web browser.
  13. 20. The 'C' in the CIA Triad, ensuring data is not disclosed to unauthorized individuals.
  14. 22. An attack that uses a massive number of computers to overwhelm a target system. (abbreviation)