Across
- 1. An attack that floods a system with traffic to shut it down (Distributed Denial of Service)
- 5. Extends a private network across a public network (Virtual Private Network)
- 8. Malicious code that attaches itself to a host program to replicate
- 9. Malware that locks your data and demands payment
- 10. The process of verifying who a user is
- 12. Converting plaintext into ciphertext to secure it
- 13. A list of entities that are denied access
- 15. A network security device that monitors and blocks traffic
- 20. Converting ciphertext back into plaintext
- 21. The process of verifying what a user is allowed to do
- 22. Malware disguised as legitimate software
- 23. Ensures systems are accessible when needed (The A in CIA)
- 24. Authentication using physical characteristics like fingerprints
Down
- 2. Random data added to a password before hashing it
- 3. A fraudulent attempt to obtain sensitive info by disguising as a trustworthy entity
- 4. Code or a technique that takes advantage of a vulnerability
- 6. The assurance that someone cannot deny the validity of something (like a signature)
- 7. A potential danger that can exploit a vulnerability
- 8. A weakness or flaw in a system
- 11. Ensures information is not disclosed to unauthorized individuals (The C in CIA)
- 14. Ensures data has not been altered or tampered with (The I in CIA)
- 16. A list of entities that are approved for unauthorized access
- 17. Spyware that records every keystroke made by a user
- 18. Malware that replicates itself to spread to other computers (no host needed)
- 19. A one-way function that turns data into a fixed-length string (used for passwords)
