FUN CyberSecurity Puzzle CIS120

1234567891011121314
Across
  1. 1. Rule specific configuration setting that determines how data flows through a firewall.
  2. 3. type of malware that spreads by attaching itself to other programs or files.
  3. 6. cyberattack that redirects users to fake websites to steal personal information.
  4. 8. A network compromised of computers controlled remotely to perform certain activities.
  5. 9. The process of converting data into code to prevent hacks.
  6. 13. A program that records keystrokes to steal information like passwords and Keys.
  7. 14. A person who gains unauthorized access to systems or networks.
Down
  1. 2. type of malware that replicates itself to spread across networks without needing a host file.
  2. 4. A group of devices used to monitor and gather information without user consent.
  3. 5. An act of disguising communication to appear as if it's from a trusted source.
  4. 7. Software updates. These fix vulnerabilities or improve security.
  5. 10. Malware or Hacker that locks users out of their system. until ransom is paid.
  6. 11. Factor Authentication The security process that requires two forms of verification to access an account.
  7. 12. vulnerability in software that is unknown to the vendor and can be exploited by attackers.