Across
- 3. malicious software that locks users out of their systems until a ransom is paid
- 4. information about potential or ongoing cyber threats
- 6. a secret word or phrase used to authenticate access to a system
- 7. a digital document used to verify the identity of a user or device
- 8. fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- 10. software that detects and removes malware
- 12. a secure environment used to isolate untrusted programs
- 14. converting data into a fixed-size value, often used in password storage
- 15. a network of infected computers controlled remotely by an attacker
- 17. a physical or digital device used to authenticate identity
- 18. the potential for loss or damage when a threat exploits a vulnerability
- 21. analysis of digital evidence to investigate security incidents
- 22. a weakness in a system that can be exploited by attackers
- 26. penetration test, used to simulate attacks on a system to find vulnerabilities
- 28. software that secretly gathers information about users without consent
- 31. a vulnerability in software that is exploited before the vendor is aware
- 32. security operations center, a team responsible for monitoring and defending systems
- 33. an actor or event that can cause harm to a system
- 34. fraudulent attempt to obtain sensitive information through email or websites
- 36. a self-replicating malware that spreads across networks
- 37. a trusted person within an organization who poses a security risk
- 38. following laws and regulations regarding data security and privacy
Down
- 1. systematic examination of security controls and processes
- 2. software designed to damage or disrupt computer systems
- 5. process of verifying the identity of a user
- 9. a security system that controls network traffic based on predetermined rules
- 11. a list of approved entities that are granted access to a system or network
- 13. distributed denial of service, an attack that overwhelms a system with traffic
- 16. a type of malware disguised as legitimate software
- 19. multi-factor authentication, requiring two or more methods to verify identity
- 20. a network security system that monitors and controls incoming and outgoing traffic
- 23. process of converting data into a coded form to prevent unauthorized access
- 24. an incident where data is accessed without authorization
- 25. intrusion detection system, designed to detect malicious activity
- 27. software that records keystrokes to steal sensitive information
- 28. pretending to be someone else or a legitimate service to deceive others
- 29. system used to monitor and analyze security events in real-time
- 30. a software update that fixes bugs and vulnerabilities
- 35. transforming data into a fixed-size value, commonly used in authentication
- 39. identity and access management, used to control user permissions
