Across
- 5. Facebook, Twitter, Instagram
- 7. A flaw or weakness in a computer system that could be exploited to violate the system's security
- 9. Widely used in-home network technology that allows for wireless
- 14. The "I" in the C-I-A Triad; protection from unauthorized changes.
- 15. A sequence of words or text used to control access to a computer; similar to a password.
- 16. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- 17. The boss and head of state
- 20. Verifying identity
- 21. Hardware or software designed to prevent unauthorized access to or from a private network.
- 22. The attacks were sourced from a botnet architecture leveraging compromised hosts in South Korea. The DDoS attacks were targeting South Korean government websites as well as the network of U.S. Forces Korea (USFK).
Down
- 1. The movie that caused the 2014 Sony Pictures attack.
- 2. Threatening behavior facilitated through electronic means such as texting.
- 3. The process of taking plain text and scrambling it into an unreadable format.
- 4. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
- 6. amount stolen from the Bank of Bangladesh
- 8. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 10. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- 11. Unauthorized access to a network, information systems, or application.
- 12. A fraudulent email purportedly from a reputable company attempting to get personal information.
- 13. Security tool that creates a secure, encrypted connection between you and the Internet.
- 18. The address of a webpage. Check the validity of it before clicking on it.
- 19. The "A" in the C-I-A Triad. It ensures authorized users have access.
