Across
- 3. A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
- 4. A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
- 9. The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
- 10. _____-force attack is a technique used to guess a password by trying many possible combinations
- 11. Gain access to someone else’s computer or device without permission
- 12. The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
- 13. Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
- 14. An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
- 16. Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
- 17. A location on the internet where you can save your data (rather than on your computer or device)
Down
- 1. A program or device used to detect and prevent unauthorized access to a network
- 2. A sequence of characters (or words) used to stop criminals from accessing your accounts
- 5. A method of protecting data by converting it into unreadable code that only authorized parties can read
- 6. Malicious software that could harm your computer or gadget
- 7. What is a form of malware that monitors and records a user's activities without their knowledge?
- 8. A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
- 12. A security incident where sensitive information is leaked to the public is a data ______
- 15. ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor