Across
- 8. the process of converting coded or encrypted data to its original form.
- 9. attempts by hackers to cause harm, destroy, or access sensitive information in a computer system.
- 11. Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
- 13. a form of malware that distributes itself by transferring copies of itself to other computers across the network.
- 14. attack swamps a website with so much traffic that it simply can’t cope
- 17. a technique used by threat actors to leverage a vulnerability in order to compromise a system.
- 19. a activity when cybercriminals disguise their identity as a trusted source to exploit an unassuming user.
- 22. a form of malware. It is designed to block users from accessing a computer system until a sum of money has been paid.
- 24. A method of accessing an obstructed device through attempting multiple combinations of numeric and/or alphanumeric passwords.
- 25. an identity verification process
- 26. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source
- 27. A chronological record of system activities. Includes records of system accesses and operations performed in a given period.
Down
- 1. a program used to prevent, identify, and remove viruses and other malicious software from your computer.
- 2. A copy of files and programs made to facilitate recovery, if necessary.
- 3. an email-based threat that tries to coerce the victim into clicking on a link in an email or opening an attachment that has arrived by email.
- 4. perform simulated cyberattacks on computer systems and networks to help identify security vulnerabilities and weaknesses.
- 5. a modern security strategy based on the principle never trust, always verify.
- 6. a network security device, it creates a barrier between a trusted network and an untrustworthy network.
- 7. A restricted, controlled execution environment that prevents potentially malicious software, such as mobile code, from accessing any system resources except those for which the software is authorized.
- 10. A system (e.g., a Web server) or system resource (e.g., a file on a server) that is designed to be attractive to potential crackers and intruders and has no authorized users other than its administrators.
- 11. Disclosure of information to unauthorized persons, or a violation of the security policy of a system.
- 12. Unauthorized act of bypassing the security mechanisms of a system.
- 15. Any circumstance or event with the potential to adversely impact organizational operations.
- 16. an encrypted internet connection to provide a secure connection.
- 18. a part of the World Wide Web only accessible through special software or tools, where keeps its users and visitors hidden.
- 20. An update to an operating system, application, or other software issued specifically to correct particular problems with the software.
- 21. an unintended software or hardware problem
- 23. An attack on the authentication protocol run in which the Attacker positions himself in between the Claimant and Verifier so that he can intercept and alter data traveling between them.