Across
- 3. - What is it called when the bug that was found in OpenSSL in 2012 was exploited
- 5. - The ______ horse was a software application that is believed to be safe but has other intended functions
- 7. - The secondary measure when identifying malware looks at virus-like _______
- 10. - What part of security it used to verify the identity of a user, device or entity
- 13. - This was an example of a popular worm in 2008
- 16. - A specific hack known as, the ________ worm, in 1988 coined the term for internet hacking
- 17. - The phrase ________ theft is coined as doing a malicious act and consuming the identification of another person
- 18. - A manipulation technique that allows for the release of information for credible gain is what type of _________ engineering
- 19. - In vintage age, hackers were known as ____________ programmers
- 20. - A lot of people are offered payment for encrypted files on a computer
Down
- 1. - What cyberattack was carried out by U.S. and Israel to damage centrifuges in Iran
- 2. - What type of testing is usually used for checking for security flaws or bugs within programs or systems
- 4. - This company was hacked from a phishing attempt where the hacker elevated privileges and gained access to 40 million credit card numbers
- 6. - This type of hack only works if a person opens an infected program or infected attachment
- 8. - What form of technology is now available to look at the biological characteristics of an individual for authentication
- 9. - The term that has been evolved to individuals who break into systems for either financial gains or to discover vulnerabilities
- 11. - The phrase also known as political hacking
- 12. - A software that is mainly used to search for malware on your computer
- 14. - What triad is very popular in Cybersecurity and it helps to prevent unauthorized access to different systems
- 15. - A method/security tool to keep data at rest and in transit safe
