IAS

123456789101112131415161718192021222324
Across
  1. 1. An attack that floods a system with traffic to shut it down (Distributed Denial of Service)
  2. 5. Extends a private network across a public network (Virtual Private Network)
  3. 8. Malicious code that attaches itself to a host program to replicate
  4. 9. Malware that locks your data and demands payment
  5. 10. The process of verifying who a user is
  6. 12. Converting plaintext into ciphertext to secure it
  7. 13. A list of entities that are denied access
  8. 15. A network security device that monitors and blocks traffic
  9. 20. Converting ciphertext back into plaintext
  10. 21. The process of verifying what a user is allowed to do
  11. 22. Malware disguised as legitimate software
  12. 23. Ensures systems are accessible when needed (The A in CIA)
  13. 24. Authentication using physical characteristics like fingerprints
Down
  1. 2. Random data added to a password before hashing it
  2. 3. A fraudulent attempt to obtain sensitive info by disguising as a trustworthy entity
  3. 4. Code or a technique that takes advantage of a vulnerability
  4. 6. The assurance that someone cannot deny the validity of something (like a signature)
  5. 7. A potential danger that can exploit a vulnerability
  6. 8. A weakness or flaw in a system
  7. 11. Ensures information is not disclosed to unauthorized individuals (The C in CIA)
  8. 14. Ensures data has not been altered or tampered with (The I in CIA)
  9. 16. A list of entities that are approved for unauthorized access
  10. 17. Spyware that records every keystroke made by a user
  11. 18. Malware that replicates itself to spread to other computers (no host needed)
  12. 19. A one-way function that turns data into a fixed-length string (used for passwords)