Across
- 1. Rule specific configuration setting that determines how data flows through a firewall.
- 3. type of malware that spreads by attaching itself to other programs or files.
- 6. cyberattack that redirects users to fake websites to steal personal information.
- 8. A network compromised of computers controlled remotely to perform certain activities.
- 9. The process of converting data into code to prevent hacks.
- 13. A program that records keystrokes to steal information like passwords and Keys.
- 14. A person who gains unauthorized access to systems or networks.
Down
- 2. type of malware that replicates itself to spread across networks without needing a host file.
- 4. A group of devices used to monitor and gather information without user consent.
- 5. An act of disguising communication to appear as if it's from a trusted source.
- 7. Software updates. These fix vulnerabilities or improve security.
- 10. Malware or Hacker that locks users out of their system. until ransom is paid.
- 11. Factor Authentication The security process that requires two forms of verification to access an account.
- 12. vulnerability in software that is unknown to the vendor and can be exploited by attackers.
